How Social Engineering Breaks Two-factor Authentication

Protecting our accounts from the entry of intruders is essential. There are many techniques that can be used to steal our passwords and access our devices. Now, we can also use different methods and tools to protect ourselves. One of the most important today is the use of two-factor authentication or 2FA. However, even using this type of barrier we could also suffer problems. In this article we will explain how social engineering could break the security of 2FA.

The importance of two-factor authentication

social-securityWhen we register for an Internet service, it is normal for us to have to enter a password. This password is what allows the account to be protected to prevent the entry of intruders that may put our privacy at risk. The point is that sometimes this key can be found by very different methods.

To increase security, to put an extra barrier, we can use two-factor authentication . This means that if someone steals our password in any way, they would still need a second step to get into our account.

Two-factor authentication is increasingly present in online registrations and also in devices. Without a doubt it is a very important safety barrier and that we should apply whenever possible. Sometimes our keys can be ascertained by errors in the platform or by mistakes we make. 2FA can protect us in these cases and thus increase security.

La importancia del uso de la autenticación 2FA

Social engineering against 2FA

The problem comes when methods capable of breaking two-factor authentication also arise. Hackers can use social engineering to achieve their objectives and thus be able to enter user accounts even when they have enabled 2FA to protect themselves.

Generally, two-step authentication consists of a code that we receive by SMS . That code is the one that allows us to later log in to an account or access a device. However, this opens the door to social engineering, as has happened in some cases.

A possible hacker could obtain the victim’s data and impersonate her for the mobile operator, for example. You could request a new shipment of a SIM card for loss. It is true that this is controlled, at least on paper, but it does not make it impossible to happen. This is reported in Dark Reading .

With the victim’s SIM card that cybercriminal could receive the two-factor authentication codes to the mobile. He would therefore have total control of his accounts.

Another method they could use related to social engineering is the installation of fraudulent applications. They can make the victim believe that it is legitimate software, but in reality it could have hidden interests. It could, when the time comes, forward all the SMS that the user receives to a device controlled by the hacker. In this way they could also receive the 2FA code to access our accounts.

In short, two-factor authentication is a very useful tool to protect our accounts, but there are still methods that could be used to break it. That is why common sense is vital and not to make mistakes that may compromise security. In addition, it is interesting to choose alternatives to 2FA through SMS, since as we have seen, it could be the case in which an attacker could obtain that code to access our accounts.

We also advise you to always use security tools and keep the equipment updated. In this way we can prevent the entry of threats that may compromise our privacy and jeopardize the proper functioning of the devices. There are many tools that we can consider and use.