Skip to content

Get Started

The MFA You Trust Is Lying to You

By Kevin Surace  |  1 minute read

As seen in Bleeping Computer

Real-time phishing attacks are now bypassing the MFA methods many organizations still use: SMS codes, push apps, and authenticator tools. In this article for Bleeping Computer, Kevin Surace, Token's Chair, explains how attackers exploit these systems by relaying login credentials through spoofed websites. The result is that users unknowingly grant access to attackers, while MFA appears to be working as intended.

The article outlines why these legacy approaches are failing and what’s required to actually stop phishing today. That includes biometric authentication, origin verification, and hardware-bound credentials that can’t be intercepted or replayed.

Read the full article on Bleeping Computer >>>

Want to see how Token Ring and Token BioStick blog these attacks?