Hackers Can Still Hack Your Accounts Even When You Use Two-Factor Authentication
Dhir Acharya - Mar 12, 2020
Two-factor authentication is believed to be a good way to prevent hackers from attacking our phones and accounts. But there are ways to overcome 2FA.
- Google to Phase Out SMS-Based Authentication Codes
- Apple Engineers Come Up With Easier Two-Factor Authentication
- 5 Best Authenticator Apps To Protect Your Accounts
You’re always advised to use two-factor authentication to cause more difficulties to hackers and protect your accounts better. Once you use two-factor authentication, you will get a code pair with your password through SMS or generated by an app.
The problem is that this doesn’t always work. Hackers once hacked Twitter account of Jack Dorsey, Twitter Chief Executive, with an IM swap attack. The attack tricked the phone's carrier to switch the mobile service to another device.

There are more and more online services like e-banking or social networks advising their users to use two-factor authentication to avoid hacking and data stealing. Millions of passwords have been leaked. A lot of us often reuse old passwords and that makes our account easier to be hacked.
It doesn’t mean you have to stop two-factor authentication. It is still very important and helpful to protect your accounts although it may be a little annoying and take more time to log in. Combining many factors with different qualities always makes it harder for hackers to steal your data.
Authentication code interception

Two-factor authentication is helpful but it is not as strong as you expect. Even when your password is used in a short time, hackers can still steal them. If hackers can hit your password lock, they can beat your security as well.
A lot of fake websites are created to collect your information. Modlishka is a new testing tool written by a security researcher. It indicates the phishing attack and shows how vulnerable websites are.
The hacker will send you an email with a link to a fake website that was created cleverly to look convincing. When you enter login details and the code you get by SMS or an authenticator app. The hackers will use that information to hack your account on the real website.
SIM swapping attacks

Another way to beat two-factor authentication is the SIM swap attack. The hacker will call to your carrier and pretend to be you and convince an employee of the carrier to switch services of your phone to another phone (obviously hacker’s phone). After your phone service is done moved, the hacker will be able to read your messages and get your authentication code as well.
Just because it is not perfect, doesn’t mean it is useless. Two-factor authentication is still better than just your passwords only, but you need to consider stronger ways to protect your accounts.
>>> 5 Best Authenticator Apps To Protect Your Accounts
Featured Stories

Features - Jun 22, 2025
Telegram Founder Pavel Durov Plans to Split $14 Billion Fortune Among 106 Children

ICT News - Jun 22, 2025
Neuralink Telepathy Chip Enables Quadriplegic Rob Greiner to Control Games with...

Features - Jun 18, 2025
Best Mobile VPN Apps for Gaming 2025: Complete Guide

Features - Jun 18, 2025
A Math Formula Tells Us How Long Everything Will Live

Features - Jun 16, 2025
Believe It Or Not, Dirt From Mars Can Be Bought With Only $20 A Kilogram

Features - Jun 15, 2025
Turn Out We Cook Rice Wrong The Whole Time, Losing 50% Good Calories

Features - Jun 14, 2025
'Five-second rule' For Food Dropped On The Floor: Is It True?

Mobile - Jun 12, 2025
Best Gaming Phones 2025: Top Devices for Mobile Gaming

Features - Jun 11, 2025
Best VPN for PUBG Mobile 2025: Lower Ping & Regional Access Guide

Features - Jun 06, 2025
15 Examples Of Maths Patterns In Nature That Will Stun You (Part 1)
Read more

ICT News- Jun 20, 2025
Tesla vs Zoox vs Waymo: Who would win?
Tesla, Zoox, and Waymo are chasing a $2 trillion market, but with safety issues and public distrust, this robotaxi race could hit a wall.

ICT News- Jun 22, 2025
Neuralink Telepathy Chip Enables Quadriplegic Rob Greiner to Control Games with Thoughts
Rob Greiner becomes sixth person implanted with Neuralink's Telepathy chip, now demonstrating ability to control games using only his thoughts after car accident.

Features- Jun 22, 2025
Telegram Founder Pavel Durov Plans to Split $14 Billion Fortune Among 106 Children
Telegram founder Pavel Durov reveals plan to split his $14 billion fortune among 106 children, including over 100 from sperm donations across 12 countries.
Comments
Sort by Newest | Popular