DEC 13, 2023
Be Careful! A Surprisingly Simple Way To Bypass 2FA
Two-factor authentication (2FA) provides an effective method for enhancing security. But it can be bypassed using specialized software, like Evilginx.
Two-factor authentication (2FA) provides an effective method for enhancing the security of our digital accounts by adding a layer of protection.
There are many types of 2FA, some safer than others, and everyone should protect their valuable accounts with some 2FA.
But SMS and app-based two-factor authentication (e.g., Google Authenticator or Microsoft Authenticator) can be bypassed by hackers using a combination of specialized software and phishing links.
In this article, we will explain how black hat hackers use Evilginx to access your 2FA-protected accounts.
So you can take steps to protect your accounts fromEvilginx and other similar MitM attacks.
Man-in-the-Middle (MitM) Attacks
In a Man-in-the-Middle (MitM) attack, the attacker secretly positions themselves between two parties and can eavesdrop on, capture, or manipulate the transmitted data.
For example, as a 'two parties,' think about you (party one) being prompted to log in to your Google account (party 2) by entering your username, password, and one-time code (OTC) generated by your 2FA.
At a high level, a MitM attack works as follows:
Interception: The attacker intercepts the communication between two parties, which could be a person and a website, two individuals, or any devices connected through a network.
👎 A common way to intercept communications is… through our cooperation. Open a phishing email or SMS, and click over the malicious link if you want to sponsor a black hat hacker.
👍 Alternatively, if you value your data and don't feel like sponsoring black hat hackers, learn how to identify phishing attempts.
Intermediary: The attacker acts as an intermediary, intercepting and possibly modifying the data exchanged between the two parties. This could involve manipulating messages, stealing sensitive information, or injecting malicious content.
☝️ In the next section, we will be explaining how black hat hackers use Evilginx to manipulate data and steal login credentials and the cookies needed to bypass two-factor authentication (2FA)
Secrecy: One of the defining characteristics of a MitM attack is that it is carried out stealthily, without the knowledge of the legitimate parties involved. The victim parties typically believe they communicate directly with each other or a trusted entity. Additionally, the victim does not even suspect that the login credentials have been compromised, which can be used by the attacker to spy on the victim.
☝️ But, in some cases, if you know where to look, you can identify if you have fallen for a MitM attack.
How Evilginx is Used to Steal Login Credentials and Bypass 2FA
To continue reading this piece you'll need to support the author by logging in and connecting a wallet and locking ACS with them. By having an locked at least the minimum of 250 ACS locked, you'll be able to continue reading this piece.