Two-factor authentication has been cracked by hackers

Image Credits: UnsplashImage Credits: Unsplash
  • Hackers have developed a phishing tool, Astaroth, that bypasses two-factor authentication by capturing both login credentials and 2FA codes in real time.
  • The tool is sold on the Dark Web for around $2,000, making it accessible to cybercriminals seeking to compromise accounts on platforms like Google and Microsoft.
  • Experts recommend using more secure authentication methods, such as biometrics or passkeys, to protect against evolving phishing threats and enhance online security.

[WORLD] Two-factor authentication (2FA) has long been hailed as one of the most effective ways to secure online accounts from unauthorized access. By requiring users to input something they know (a password) and something they have (usually a code sent via SMS or email), 2FA provides an additional layer of security that makes it significantly harder for hackers to break into accounts. However, recent developments have shown that hackers have found ways to bypass these protections, making the future of online security increasingly uncertain.

A new phishing tool, named Astaroth, has emerged as a serious threat to two-factor authentication systems. According to a report by cybersecurity experts at SlashNext, Astaroth is capable of bypassing 2FA mechanisms on popular platforms like Google, Microsoft, and Yahoo. The tool is sold on the Dark Web for around $2,000 (RM8,855), making it accessible to cybercriminals with the necessary resources. This phishing kit exploits users' trust and can steal both login credentials and the critical authentication codes that should protect them.

"Hackers have developed a phishing kit capable of bypassing two-factor authentication systems, previously considered to be one of the most secure ways of protecting access to online accounts." The tool works by sending fraudulent links to users, which direct them to a fake login page that closely resembles the legitimate one for services like Google or Microsoft. When the user enters their login credentials, along with the 2FA code, the hackers capture both pieces of information in real time, allowing them to gain unauthorized access to the victim's account.

This new attack method highlights a critical vulnerability in two-factor authentication: the reliance on SMS or email-based codes. While these methods were once considered secure, they can now be intercepted by sophisticated phishing attacks. In fact, Astaroth's ability to bypass these codes in real time makes it particularly dangerous.

How Astaroth Works

Astaroth operates by exploiting the trust that users place in legitimate-looking login pages. When a victim clicks on a phishing link sent by the hacker, they are taken to a fake page designed to mirror the official login interface of a popular platform. The user enters their password and, if 2FA is enabled, their authentication code. Instead of being securely processed by the legitimate service, the hacker collects this sensitive information, which is then used to access the account.

One of the most concerning aspects of this attack is Astaroth's ability to intercept the 2FA codes as they are entered. While traditional phishing schemes typically only target passwords, Astaroth goes a step further by capturing both the username and the second factor of authentication, effectively rendering two-factor authentication useless in this case.

"What makes Astaroth particularly dangerous is its ability to intercept two-factor authentication codes in real time," said SlashNext in their report. This method of attack has raised alarm bells among cybersecurity experts, as it shows how even the most robust security measures can be compromised by clever phishing techniques.

The Dark Web Marketplace: A Growing Threat

Astaroth is not an isolated case. The fact that the tool is being sold on the Dark Web for a relatively low price suggests that it may soon become more widespread. Cybercriminals can easily purchase phishing kits and use them to target individual users or large organizations. This poses a significant challenge for businesses that rely on 2FA to secure their employees' accounts, as phishing attacks can bypass this security layer with minimal effort.

The existence of such tools on the Dark Web underscores the increasing sophistication of cybercriminals. These malicious actors are no longer relying solely on brute force attacks or traditional malware. Instead, they are investing in more advanced methods, like phishing kits, that allow them to circumvent even the most advanced security protocols.

"The complete kit is sold on the Dark Web for US$2,000 (RM8,855)," making it accessible to a wide range of cybercriminals. While $2,000 might seem like a steep price for a piece of malicious software, it is a small investment when compared to the potential profits from hacking into high-profile accounts or stealing sensitive data.

How to Protect Yourself from Phishing Attacks

The emergence of Astaroth and other phishing tools is a stark reminder that no security measure is entirely foolproof. However, there are steps that users can take to protect themselves against phishing attacks and ensure that their accounts remain secure.

Be Cautious with Links: One of the simplest ways to avoid falling victim to phishing attacks is to be wary of clicking on links from unknown or suspicious sources. If you receive an unsolicited email with a link asking you to log in, it's better to visit the official website directly rather than trusting the link provided.

Enable Multi-Factor Authentication: While 2FA can be bypassed by phishing tools like Astaroth, multi-factor authentication (MFA) methods that rely on more secure methods, such as biometrics (fingerprint or facial recognition), offer an extra layer of protection. Services like Apple, Google, and Microsoft now support passwordless login options, which can help reduce the risk of phishing.

Use Anti-Phishing Tools: Many modern browsers and email services have built-in anti-phishing protections that can detect fraudulent websites and warn users before they enter their credentials. Be sure to enable these features to add an extra layer of defense.

Educate Yourself and Others: Phishing attacks are often successful because users are unaware of the risks. Educating yourself and those around you about common phishing tactics can significantly reduce the likelihood of falling victim to these schemes.

Monitor Your Accounts: Regularly reviewing your account activity and enabling alerts for unusual login attempts can help you detect unauthorized access early and take action before significant damage is done.

Moving Beyond Two-Factor Authentication

As the methods used by cybercriminals continue to evolve, it may be time to rethink the effectiveness of traditional two-factor authentication. While it remains a valuable tool for securing online accounts, it is no longer enough to rely solely on SMS or email-based codes.

"It's advisable to use other, even more secure authentication methods, such as passkeys, which allow you to log in without a password, using a fingerprint, facial recognition, or a code stored on the device." These advanced authentication methods are increasingly supported by major tech companies, including Apple, Google, and Microsoft. By adopting these more secure alternatives, users can reduce their vulnerability to phishing attacks and better protect their online identities.

The Future of Cybersecurity: A Call to Action

The discovery of Astaroth and other similar phishing tools highlights the ongoing arms race between hackers and cybersecurity experts. As cybercriminals develop more sophisticated methods for bypassing security protocols, companies and individuals must stay vigilant and adopt more secure authentication methods.

The growing threat of phishing and the ability to bypass two-factor authentication systems underscores the need for continuous innovation in cybersecurity. "It's advisable to use other, even more secure authentication methods," such as biometrics and passkeys, as well as employing good cybersecurity hygiene practices, to stay ahead of evolving threats.

While two-factor authentication is still an important tool in the fight against cybercrime, it is clear that it is not enough on its own. To truly secure sensitive information and online accounts, users must embrace the latest advancements in authentication and remain vigilant in the face of increasingly sophisticated threats.


Culture
Image Credits: Unsplash
CultureAugust 1, 2025 at 6:00:00 PM

Is the future of customer service powered by AI agents?

Let me tell you the truth most founders don’t want to hear: slapping an AI chatbot onto your customer support page isn’t going...

Technology
Image Credits: Unsplash
TechnologyAugust 1, 2025 at 12:00:00 AM

Screen time isn’t the problem—avoiding digital responsibility is

On Instagram Reels and TikTok, thousands of parents share hacks for managing their kids’ screen time. One hides the Wi-Fi router in a...

Marketing
Image Credits: Unsplash
MarketingJuly 31, 2025 at 1:00:00 AM

The impact of AI on modern marketing communications

You can always tell when a business is bluffing. It’s in the copy. It’s in the pitch deck. It’s in the moment a...

Technology
Image Credits: Unsplash
TechnologyJuly 29, 2025 at 5:30:00 PM

How unhealthy is binge watching? Press pause, and read on

There’s a particular kind of silence that fills a room when the next episode auto-plays. Not the suspenseful kind. The heavy, too-familiar kind...

Technology United States
Image Credits: Unsplash
TechnologyJuly 28, 2025 at 12:00:00 PM

TikTok US ownership strategy faces strategic crossfire

While US politicians volley public sentiments over TikTok’s national security risk, the real battleground isn’t data policy—it’s ownership structure. The recent comment from...

Technology
Image Credits: Unsplash
TechnologyJuly 26, 2025 at 7:00:00 PM

What the Coldplay ‘kiss cam’ scandal says about privacy in public spaces

What began as a fleeting moment during a Coldplay concert on July 16—just two people caught on the venue’s kiss cam—ended in an...

Technology
Image Credits: Unsplash
TechnologyJuly 26, 2025 at 3:00:00 PM

What screen time is quietly doing to children

Walk into any living room, school hallway, or pediatric clinic and you’ll hear it—concern, curiosity, quiet panic. It goes something like this: “He’s...

Technology
Image Credits: Unsplash
TechnologyJuly 25, 2025 at 11:00:00 PM

How AI tools quietly hijack our time

It was supposed to be a quick message. Just a simple reply to a coworker’s Slack ping, followed by a 15-minute AI-assisted calendar...

Technology
Image Credits: Unsplash
TechnologyJuly 25, 2025 at 8:30:00 PM

Does AI limit creativity—or just redefine it?

On any given day, you can scroll through Instagram and see AI-generated portraits styled like Renaissance paintings. On TikTok, teenagers post fashion editorials...

Technology
Image Credits: Unsplash
TechnologyJuly 24, 2025 at 4:30:00 PM

Hey Google, is voice search better than typing?

You say it almost without thinking. “Hey Google…” It’s become the invisible start to so many small rituals. When your hands are wet...

Technology
Image Credits: Unsplash
TechnologyJuly 18, 2025 at 8:30:00 AM

Why 2025’s scams are so hard to spot—and how to stay safe

One minute you're scrolling through your phone. The next, you’ve received a job offer from a company you admire. Or maybe a text...

Financial Planning
Image Credits: Unsplash
Financial PlanningJuly 17, 2025 at 4:00:00 PM

Save money on groceries with ChatGPT

There’s a hidden line item in most household budgets that can swing by hundreds of dollars a month without anyone noticing. It’s not...

Load More