{"id":21766,"date":"2020-04-06T13:33:07","date_gmt":"2020-04-06T11:33:07","guid":{"rendered":"https:\/\/mailcommsgroup.com\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/"},"modified":"2023-09-08T09:38:23","modified_gmt":"2023-09-08T07:38:23","slug":"how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users","status":"publish","type":"post","link":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/","title":{"rendered":"How attackers bypass the new two-factor ID and how to protect your users"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row type=&#8221;grid&#8221; css=&#8221;.vc_custom_1547557263471{margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column dp_animation=&#8221;&#8221; el_class=&#8221;El nuevo reglamento europeo obliga a recabar el consentimiento expl\u00edcito para el tratamiento de los datos de car\u00e1cter personal&#8221; font_color=&#8221;#81d742&#8243;][vc_single_image image=&#8221;5437&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;grid&#8221; css=&#8221;.vc_custom_1555933626160{margin-top: 0px !important;padding-top: 20px !important;}&#8221;][vc_column dp_animation=&#8221;&#8221; css=&#8221;.vc_custom_1547557427896{padding-top: 0px !important;}&#8221;][vc_column_text dp_animation=&#8221;&#8221;]<\/p>\n<h2 data-fontsize=\"30\" data-lineheight=\"42\"><strong>Preparing the attack<\/strong><\/h2>\n<p>To execute the attack we will use a combination of two tools, Muraena and Necrobrowser. Muraena is a <em><br \/>\n  <a href=\"https:\/\/en.wikipedia.org\/wiki\/Reverse_proxy\">reverse proxy<\/a><br \/>\n<\/em> that will run our <em>phishing<\/em> page. The <em>phishing<\/em> page will be the original page that the victim will interact with. Once the victim has authenticated to the session, Muraena will hand over the session to Necrobrowser, allowing the attacker to take control of the session or automate the next steps of the attack. Because Muraena acts as a reverse <em>proxy<\/em>, there will be no difference between our malicious site and the original website, apart from the URL. Muraena can be configured to use SSL with certificates obtained through, for example, LetsEncrypt. From the victim&#8217;s point of view, the whole experience will seem legitimate, as it simulates interacting with the original page. They will go through the regular authentication process, including 2FA. If the 2FA consists of a regular one-time password (OTP) sent by SMS, hardware <em>token<\/em> or software, then the victim will enter it as usual. However, even modern methods, such as an automatic notification to a mobile device or scanning a QR code on the screen, will be ignored by this attack.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;5449&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; dp_animation=&#8221;&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text dp_animation=&#8221;&#8221;]<\/p>\n<ol>\n<li>The user visits the <em>phishing<\/em> page, which has SSL enabled.<\/li>\n<li>The reverse <em>proxy<\/em> (Muraena) looks for the legitimate banking page and delivers a copy to the victim.<\/li>\n<li>The victim attempts to log in to the page and is prompted for two-factor authentication.<\/li>\n<li>After the victim has completed the authentication process, the reverse <em>proxy <\/em>(Muraena) hands over the session to the attacker (Necrobrowser) to take control, cutting off the victim.<\/li>\n<\/ol>\n<p>In the image below you can see Muraena hosting Google on the phish.anti domain. For demonstration purposes, a local DNS will be configured to resolve this on your test machine and also issue certificates using your own CA, which the browser trusts. However, this is exactly what it would look like from the victim&#8217;s perspective if it were implemented on your own domain using valid certificates.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;5447&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; dp_animation=&#8221;&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text dp_animation=&#8221;&#8221;]<\/p>\n<h2 data-fontsize=\"30\" data-lineheight=\"42\"><strong>Protecting against attack<\/strong><\/h2>\n<p>Now that we understand how the attack works, we can identify what steps would be necessary to identify or protect against this type of attack.<\/p>\n<p><strong>The dynamic link<\/strong> provides a good first layer of defense against a variety of attacks. Dynamic linking consists of two-factor authentication performed at the time of the transaction, which incorporates the transaction details into the signing process; often referred to as  <em>What you see is what you sign<\/em>because the end user must receive the details of the transaction before completing the signing process. Once signed, the signature should only be valid for this specific transaction, making it more difficult for the attacker to bypass. Typically, dynamic linking is implemented through hardware <em>tokens<\/em>, software <em>tokens<\/em> or integrated as part of a banking application. Below, we have two examples of dynamic links, first for a legitimate payment and the second when an attacker tries to modify the payment.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;5445&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; dp_animation=&#8221;&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text dp_animation=&#8221;&#8221;]<\/p>\n<ol>\n<li>The user creates a transaction in online banking.<\/li>\n<li>The user sends the transaction.<\/li>\n<li>The bank sends the transaction details to the user&#8217;s cell phone.<\/li>\n<li>The user verifies the transfer details and authorizes the payment with biometrics (or other second factor).<\/li>\n<li>The mobile application generates a one-time password (OTP) using the transaction details and <em>token<\/em> key within the mobile application.<\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;5443&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; dp_animation=&#8221;&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text dp_animation=&#8221;&#8221;]<\/p>\n<ol>\n<li>The user attempts to make a payment in online banking.<\/li>\n<li>The attacker modifies the payment to have a new account and\/or amount of money.<\/li>\n<li>The bank sends the transaction details to the user&#8217;s cell phone.<\/li>\n<li>The user is presented with the modified payment information and rejects the payment.<\/li>\n<\/ol>\n<p>The above examples also illustrate the importance of using end-to-end encryption when implementing dynamic linking. In addition, it shows that the mobile application itself must be protected, as the attacker may try to attack the application to hide the user&#8217;s modified payment details.<\/p>\n<p>Another effective way to recognize and defend against a wide variety of attacks is to implement <strong>continuous monitoring<\/strong> on your digital platforms. By monitoring the session from the time of login to the end of the session, we can better put into context those actions of users and the devices or accounts with which they are associated. Continuous monitoring combines perfectly with other layers, such as 2FA or dynamic links, as they also allow the bank to put itself in context from these authentication devices.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_single_image image=&#8221;5441&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; dp_animation=&#8221;&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text dp_animation=&#8221;&#8221;]The bank can then monitor typical indicators of known attacks, such as new devices, locations, <em>proxy <\/em>presence or others. This information can be correlated across your user base to better understand the risk of these items. Then we can also take into account the operations that the user is performing during the whole session and compare this with his usual behavior. This approach establishes a continuous risk profile for the session that can change with each action taken by the end user. This not only allows the bank to take automated actions in real time when anomalies are detected, but also allows the bank to reduce friction for legitimate sessions by reducing the number of authentications required for real sessions.<\/p>\n<h2 data-fontsize=\"30\" data-lineheight=\"42\"><strong>Conclusion<\/strong><\/h2>\n<p>While the attack in this article talks about technology and concepts that have been around for centuries, we see that applying them correctly can still lead to great success and fight against various authentication methods implemented today. It is important for banks to use a layered approach, as most of the individual layers can be attacked or dynamited. When implementing dynamic links, banks must ensure that they establish a secure line of communication with the end user. For example, trusting an SMS is no longer reliable, since messages can be stolen, forged or intercepted by the attacker. However, when implementing mobile applications, banks must also be aware that these applications become a target and must protect their mobile applications from external attacks. The goal of this article is primarily to demonstrate that <em>phishing<\/em> attacks can be modernized to defeat two-factor authentication at login and implementing 2FA alone does not provide complete protection against <em>phishing<\/em>. Finally, we have mentioned some layers that banks can implement to provide greater protection to their end users, as well as what pitfalls to avoid in doing so. To summarize:<\/p>\n<ul>\n<li>It implements <strong>dynamic links <\/strong>with end-to-end encryption.<\/li>\n<li>Implements server-side analytics to <strong>monitor <\/strong>end-user sessions, devices and behavior in the face of potential attacks.<\/li>\n<li><strong>Protect <\/strong>your mobile <strong>applications <\/strong>from <em>malware<\/em> and other external threats.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;grid&#8221; css=&#8221;.vc_custom_1615220764691{margin-top: 50px !important;margin-bottom: 30px !important;padding-top: 0px !important;padding-right: 20px !important;padding-bottom: 10px !important;padding-left: 20px !important;background-color: #e4e4e4 !important;}&#8221;][vc_column dp_animation=&#8221;&#8221;][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text dp_animation=&#8221;&#8221; css=&#8221;.vc_custom_1615220521451{margin-bottom: 20px !important;}&#8221;]<\/p>\n<h2>eBook<\/h2>\n<h3>Account takeover fraud: how to protect your customers and businesses<\/h3>\n<p>Helps prevent account takeover fraud and protects customers at every stage of their <em>digital journeys<\/em>.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;5439&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][\/vc_row_inner][vc_btn title=&#8221;DOWNLOAD NOW&#8221; style=&#8221;classic&#8221; shape=&#8221;round&#8221; size=&#8221;lg&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fwww.onespan.com%2Fresources%2Faccount-takeover-fraud-how-protect-your-customers-and-business|&#8221; el_class=&#8221;boton-blog&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;grid&#8221;][vc_column dp_animation=&#8221;&#8221;][vc_column_text dp_animation=&#8221;&#8221;]Content extracted from <strong><br \/>\n  <a href=\"https:\/\/www.onespan.com\/blog\/how-attackers-bypass-modern-two-factor-authentication-and-how-protect-your-users\" target=\"_blank\" rel=\"noopener\">OneSpan<\/a><br \/>\n<\/strong>.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In this article we will look at an example of tools and techniques that attackers can use to bypass most traditional two-factor authentication (2FA) methods, from an OTP via SMS to encrypted push notifications for a mobile app. The attack method can be very effective against most types of 2FA implemented today, including out-of-band authentication. We will also discuss what kind of countermeasures banks can implement to mitigate the risk of such attacks and protect their customers.<\/p>\n","protected":false},"author":13,"featured_media":5438,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[480,481],"class_list":["post-21766","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-communication-solutions-with-legal-value","category-omnichannel-communication-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How attackers bypass the new two-factor ID and how to protect your users - Mailcomms Group<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How attackers bypass the new two-factor ID and how to protect your users - Mailcomms Group\" \/>\n<meta property=\"og:description\" content=\"In this article we will look at an example of tools and techniques that attackers can use to bypass most traditional two-factor authentication (2FA) methods, from an OTP via SMS to encrypted push notifications for a mobile app. The attack method can be very effective against most types of 2FA implemented today, including out-of-band authentication. We will also discuss what kind of countermeasures banks can implement to mitigate the risk of such attacks and protect their customers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailcomms Group\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-06T11:33:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-08T07:38:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2021\/03\/autenticacion-de-dos-factores-2FA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"892\" \/>\n\t<meta property=\"og:image:height\" content=\"623\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alberto Fidalgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CommsCustomer\" \/>\n<meta name=\"twitter:site\" content=\"@CommsCustomer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alberto Fidalgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/\"},\"author\":{\"name\":\"Alberto Fidalgo\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214\"},\"headline\":\"How attackers bypass the new two-factor ID and how to protect your users\",\"datePublished\":\"2020-04-06T11:33:07+00:00\",\"dateModified\":\"2023-09-08T07:38:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/\"},\"wordCount\":1467,\"publisher\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2021\/03\/autenticacion-de-dos-factores-2FA.jpg\",\"articleSection\":[\"Communication solutions with legal value\",\"Omnichannel communication solutions\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/\",\"name\":\"How attackers bypass the new two-factor ID and how to protect your users - Mailcomms Group\",\"isPartOf\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2021\/03\/autenticacion-de-dos-factores-2FA.jpg\",\"datePublished\":\"2020-04-06T11:33:07+00:00\",\"dateModified\":\"2023-09-08T07:38:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#primaryimage\",\"url\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2021\/03\/autenticacion-de-dos-factores-2FA.jpg\",\"contentUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2021\/03\/autenticacion-de-dos-factores-2FA.jpg\",\"width\":892,\"height\":623,\"caption\":\"Ciberseguridad: autenticaci\u00f3n de dos factores (2FA)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mailcomms Group\",\"item\":\"https:\/\/mailcommsgroup.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/mailcommsgroup.com\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How attackers bypass the new two-factor ID and how to protect your users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#website\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/\",\"name\":\"MailComms Group\",\"description\":\"La transformaci\u00f3n digital a trav\u00e9s de la comunicaci\u00f3n omnicanal, con plena validez legal.\",\"publisher\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\"},\"alternateName\":\"MailComms Group\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailcommsgroup.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\",\"name\":\"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.\",\"alternateName\":\"MailComms Group\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png\",\"contentUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png\",\"width\":512,\"height\":512,\"caption\":\"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CommsCustomer\",\"https:\/\/www.linkedin.com\/company\/customercomms\/\",\"https:\/\/www.youtube.com\/channel\/UCtvYLee1QHy89JS2-gMgnTQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214\",\"name\":\"Alberto Fidalgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g\",\"caption\":\"Alberto Fidalgo\"},\"url\":\"https:\/\/mailcommsgroup.com\/en\/blog\/author\/alberto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How attackers bypass the new two-factor ID and how to protect your users - Mailcomms Group","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/","og_locale":"en_US","og_type":"article","og_title":"How attackers bypass the new two-factor ID and how to protect your users - Mailcomms Group","og_description":"In this article we will look at an example of tools and techniques that attackers can use to bypass most traditional two-factor authentication (2FA) methods, from an OTP via SMS to encrypted push notifications for a mobile app. The attack method can be very effective against most types of 2FA implemented today, including out-of-band authentication. We will also discuss what kind of countermeasures banks can implement to mitigate the risk of such attacks and protect their customers.","og_url":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/","og_site_name":"Mailcomms Group","article_published_time":"2020-04-06T11:33:07+00:00","article_modified_time":"2023-09-08T07:38:23+00:00","og_image":[{"width":892,"height":623,"url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2021\/03\/autenticacion-de-dos-factores-2FA.jpg","type":"image\/jpeg"}],"author":"Alberto Fidalgo","twitter_card":"summary_large_image","twitter_creator":"@CommsCustomer","twitter_site":"@CommsCustomer","twitter_misc":{"Written by":"Alberto Fidalgo","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#article","isPartOf":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/"},"author":{"name":"Alberto Fidalgo","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214"},"headline":"How attackers bypass the new two-factor ID and how to protect your users","datePublished":"2020-04-06T11:33:07+00:00","dateModified":"2023-09-08T07:38:23+00:00","mainEntityOfPage":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/"},"wordCount":1467,"publisher":{"@id":"https:\/\/mailcommsgroup.com\/en\/#organization"},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#primaryimage"},"thumbnailUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2021\/03\/autenticacion-de-dos-factores-2FA.jpg","articleSection":["Communication solutions with legal value","Omnichannel communication solutions"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/","url":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/","name":"How attackers bypass the new two-factor ID and how to protect your users - Mailcomms Group","isPartOf":{"@id":"https:\/\/mailcommsgroup.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#primaryimage"},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#primaryimage"},"thumbnailUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2021\/03\/autenticacion-de-dos-factores-2FA.jpg","datePublished":"2020-04-06T11:33:07+00:00","dateModified":"2023-09-08T07:38:23+00:00","breadcrumb":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#primaryimage","url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2021\/03\/autenticacion-de-dos-factores-2FA.jpg","contentUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2021\/03\/autenticacion-de-dos-factores-2FA.jpg","width":892,"height":623,"caption":"Ciberseguridad: autenticaci\u00f3n de dos factores (2FA)"},{"@type":"BreadcrumbList","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/how-attackers-avoid-the-new-two-factor-identification-and-how-to-protect-your-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mailcomms Group","item":"https:\/\/mailcommsgroup.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/mailcommsgroup.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"How attackers bypass the new two-factor ID and how to protect your users"}]},{"@type":"WebSite","@id":"https:\/\/mailcommsgroup.com\/en\/#website","url":"https:\/\/mailcommsgroup.com\/en\/","name":"MailComms Group","description":"La transformaci\u00f3n digital a trav\u00e9s de la comunicaci\u00f3n omnicanal, con plena validez legal.","publisher":{"@id":"https:\/\/mailcommsgroup.com\/en\/#organization"},"alternateName":"MailComms Group","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailcommsgroup.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailcommsgroup.com\/en\/#organization","name":"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.","alternateName":"MailComms Group","url":"https:\/\/mailcommsgroup.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png","contentUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png","width":512,"height":512,"caption":"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal."},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CommsCustomer","https:\/\/www.linkedin.com\/company\/customercomms\/","https:\/\/www.youtube.com\/channel\/UCtvYLee1QHy89JS2-gMgnTQ"]},{"@type":"Person","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214","name":"Alberto Fidalgo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g","caption":"Alberto Fidalgo"},"url":"https:\/\/mailcommsgroup.com\/en\/blog\/author\/alberto\/"}]}},"_links":{"self":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/21766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/comments?post=21766"}],"version-history":[{"count":3,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/21766\/revisions"}],"predecessor-version":[{"id":22042,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/21766\/revisions\/22042"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/media\/5438"}],"wp:attachment":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/media?parent=21766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/categories?post=21766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}