Phishing Education

MFA Guide: Phishing-Resistant Authentication

By Editorial Team Published

MFA Guide: Phishing-Resistant Authentication

Multi-factor authentication (MFA) is the single most effective control against credential-based attacks. CISA recommends MFA as a baseline security measure, and Microsoft reports that MFA blocks 99.9% of automated credential attacks. But not all MFA is equal — SMS codes and authenticator app TOTP codes can be phished through real-time proxy attacks, while FIDO2 security keys and passkeys are cryptographically resistant to phishing.

Understanding the MFA spectrum is critical as AI-generated phishing campaigns increasingly target MFA workflows.

The MFA Phishing Resistance Spectrum

MFA MethodPhishing Resistant?How It Can Be Compromised
SMS codesNoSIM swapping, real-time phishing proxies, smishing
Email codesNoEmail compromise, real-time phishing proxies
TOTP apps (Google Authenticator)NoReal-time phishing proxies (Evilginx, Modlishka)
Push notificationsPartiallyMFA fatigue (repeated push bombing)
Number matching pushPartiallySocial engineering during active phishing session
FIDO2 security keysYesPhysical theft only (requires proximity)
Passkeys (device-bound)YesDevice compromise only
Passkeys (synced)MostlyPlatform account compromise

CISA and NIST explicitly recommend phishing-resistant MFA (FIDO2/WebAuthn) for privileged users and high-value systems.

How Phishing Defeats Traditional MFA

Real-Time Proxy Attacks

Tools like Evilginx2 and Modlishka set up a transparent proxy between the victim and the legitimate login page. The victim enters their username, password, and MFA code on what appears to be the real site. The proxy captures everything in real time and uses it to authenticate as the victim before the code expires.

This attack defeats SMS codes, email codes, and TOTP codes because all of these methods produce a value that the attacker can capture and replay within the validity window (typically 30-60 seconds).

MFA Fatigue / Push Bombing

Attackers who have stolen a password trigger repeated push notification prompts on the victim’s phone. Eventually, the victim approves a prompt to stop the notifications — or accidentally taps “approve” while trying to dismiss them. Number-matching push (requiring the user to enter a displayed number) partially mitigates this but remains vulnerable during active social engineering.

SIM Swapping

Attackers convince a mobile carrier to port the victim’s phone number to a new SIM, intercepting all SMS codes. This has been used in high-profile account takeovers including cryptocurrency thefts.

Why FIDO2 and Passkeys Are Phishing-Resistant

FIDO2 (Fast Identity Online 2) uses public key cryptography bound to the specific website origin. When you register a security key with bank.com, the key creates a unique cryptographic key pair for that exact domain. If an attacker sends you to bank-login.evil.com, your security key refuses to authenticate because the domain does not match.

This is a fundamental architectural defense, not a user behavior defense. The user does not need to notice the fake domain — the key handles it cryptographically.

Security Keys (Hardware FIDO2)

Physical USB or NFC devices (YubiKey, Google Titan, Feitian) that store cryptographic keys. Strongest protection, requiring both possession of the physical key and user interaction (touch/tap).

Passkeys (Software FIDO2)

Passkeys use the same cryptographic protocol as hardware security keys but store the credential on your device (phone, laptop) and authenticate via biometrics (fingerprint, face) or device PIN. Synced passkeys can be backed up to platform accounts (Apple iCloud Keychain, Google Password Manager).

Implementation Guide

For Individuals

  1. Enable the strongest MFA available on every account — FIDO2 > passkeys > authenticator app > SMS (in order of preference)
  2. Register at least two security keys (one primary, one backup stored securely)
  3. Migrate away from SMS-based MFA wherever possible
  4. Set up passkeys for services that support them (Google, Apple, Microsoft, many banks)
  5. Store backup codes in a secure location (password manager or physical safe)

For Organizations

Priority 1 — Critical accounts:

  • Mandate FIDO2 security keys for IT administrators, executives, and finance staff
  • Disable SMS/TOTP as fallback methods for privileged accounts
  • Require phishing-resistant MFA for VPN, email, and cloud admin access

Priority 2 — All employees:

  • Deploy passkeys or authenticator apps as minimum MFA for all accounts
  • Enable number-matching push notifications (eliminates fatigue attacks)
  • Distribute security keys to all employees in high-risk roles (healthcare, financial)

Priority 3 — Customer-facing:

  • Offer FIDO2/passkey options to customers
  • Implement risk-based authentication that increases verification for unusual activity
  • Phase out SMS-based 2FA for customer accounts

Integration with Other Defenses

MFA works best as part of a layered defense:

MFA Recovery Planning

Strong MFA creates a recovery challenge. Plan for:

  • Lost security keys: Require registration of at least two keys, with one stored off-site
  • Lost devices: Maintain backup authentication methods for passkey recovery
  • Account lockout: Establish verified identity recovery procedures that do not rely on phishable methods
  • Employee offboarding: Revoke MFA registrations when employees leave

Key Takeaways

  • MFA blocks 99.9% of automated credential attacks, but not all MFA methods resist phishing
  • SMS codes, email codes, and TOTP can all be captured by real-time phishing proxies
  • FIDO2 security keys and passkeys are cryptographically phishing-resistant — the key refuses to authenticate on fake domains
  • Mandate FIDO2 for privileged accounts; deploy passkeys or authenticator apps for all users
  • Register at least two security keys per account to avoid lockout
  • MFA is most effective when combined with email authentication, filtering, and training

For the complete phishing defense framework, see our phishing recognition and reporting guide.

Sources

Security education disclaimer: This article discusses authentication vulnerabilities for educational purposes only. Understanding how MFA can be bypassed helps organizations choose phishing-resistant methods. Do not use this information for unauthorized access.