What is a 2FA bypass attack?

Short answer

2FA bypass attacks defeat second-factor authentication. Top vectors in 2026: SIM-swap (phone-based 2FA), phishing with real-time proxy (stealing session cookies mid-login), push-fatigue (spamming prompts until user approves), and recovery-flow abuse. Passkeys defeat most of these.

Common 2FA bypass techniques an attacker uses:

**SIM-swap** Attacker social-engineers your mobile carrier to transfer your number to their SIM. SMS codes go to them. The attack is fast (~1 hour) and hard to detect. Defense: disable SMS 2FA; use TOTP or passkey.

**Adversary-in-the-middle (AiTM) phishing** Attacker runs a real-time reverse proxy. Victim enters credentials + 2FA code on the fake site, which forwards them to the real site and captures the session cookie. Modern phish kits do this automatically. Defense: passkeys (bound to origin) or strict DNS / TLS validation.

**Push fatigue / MFA bombing** Attacker repeatedly triggers push notifications until user taps 'approve' out of frustration. Defense: require number-matching MFA (Duo, Microsoft Authenticator's number match).

**Recovery abuse** Attacker uses 'lost my 2FA' flow to reset. Defense: recovery requires multiple factors + manual review.

What beats most of these: passkeys. They're bound to origin (beat AiTM), don't rely on shared secrets (beat SIM-swap), and don't require push approval (beat fatigue).

People also ask