Token Blog: Phishing and Ransomware Articles

The MFA You Trust Is Lying to You

Written by Kevin Surace | Jul 14, 2025 11:45:44 AM

As seen in Bleeping Computer

Real-time phishing attacks are now bypassing the MFA methods many organizations still use: SMS codes, push apps, and authenticator tools. In this article for Bleeping Computer, Kevin Surace, Token's Chair, explains how attackers exploit these systems by relaying login credentials through spoofed websites. The result is that users unknowingly grant access to attackers, while MFA appears to be working as intended.

The article outlines why these legacy approaches are failing and what’s required to actually stop phishing today. That includes biometric authentication, origin verification, and hardware-bound credentials that can’t be intercepted or replayed.

Read the full article on Bleeping Computer >>>

Want to see how Token Ring and Token BioStick blog these attacks?