PROBABLYPWNED
Security GuidesFebruary 12, 20267 min read

What Is MFA? Multi-Factor Authentication Explained

What is MFA? Learn how multi-factor authentication works, the three authentication factors, and why FIDO2 passkeys are the future of phishing-resistant security.

Emily Park

You've probably been prompted to enable MFA on your bank account, your email, or your work applications. But what exactly is multi-factor authentication, and why do security teams keep pushing it? The short answer: MFA blocks over 99.9% of automated account attacks, according to Microsoft's research. That makes it one of the most effective security controls available.

TL;DR

  • What it is: MFA requires two or more verification methods to prove your identity when logging in
  • Why it matters: Passwords alone aren't enough—MFA blocks the vast majority of credential-based attacks
  • Key takeaway: Not all MFA is equal; FIDO2 passkeys and hardware keys offer the strongest protection against phishing

What Is MFA (Multi-Factor Authentication)?

Multi-factor authentication is a security method that requires users to verify their identity using at least two different authentication factors before gaining access to an account or system. Instead of relying solely on a password (something you know), MFA adds additional verification like a code from your phone (something you have) or a fingerprint scan (something you are). This layered approach means an attacker who steals your password still can't access your account without the second factor.

The Three Authentication Factors

Authentication factors fall into three categories, and effective MFA combines at least two of them:

Something You Know This is the traditional factor—passwords, PINs, security questions, or passphrases. It's familiar but increasingly vulnerable. Credential stuffing attacks, where attackers test stolen username/password combinations across multiple sites, have made knowledge-based authentication unreliable on its own. If you're reusing passwords (and most people are), a breach on one site compromises your accounts everywhere.

Something You Have This factor proves you possess a specific device or object. Common examples include:

  • Authenticator apps (Google Authenticator, Microsoft Authenticator, Authy)
  • SMS codes sent to your phone
  • Hardware security keys (YubiKey, Google Titan)
  • Push notifications to a registered device

The possession factor blocks most automated attacks because the attacker needs physical access to your device, not just your credentials.

Something You Are Biometric authentication uses physical characteristics unique to you—fingerprints, facial recognition, iris scans, or voice recognition. Modern smartphones have made biometrics mainstream through Touch ID and Face ID. These factors are convenient and hard to steal, though they're typically used in combination with other factors rather than alone.

How MFA Works in Practice

When you log into an MFA-protected account, here's what happens:

  1. You enter your username and password (first factor)
  2. The system prompts for a second verification method
  3. You provide the second factor—maybe a six-digit code from your authenticator app, a fingerprint scan, or approval via push notification
  4. Only after both factors verify successfully do you gain access

This flow adds a few seconds to login but makes unauthorized access significantly harder. An attacker might phish your password, but they'd also need to compromise your phone or intercept your authentication code in real-time.

Common MFA Methods Compared

Not all MFA provides equal protection. Here's how the common methods stack up:

SMS Codes The weakest MFA option, but better than nothing. Attackers can intercept SMS through SIM swapping attacks or SS7 protocol vulnerabilities. The FBI has warned about these risks for years, but SMS remains popular because it requires no additional apps or devices.

Authenticator Apps Apps like Google Authenticator or Microsoft Authenticator generate time-based one-time passwords (TOTP) that change every 30 seconds. They're more secure than SMS because the codes never travel over the cellular network. However, users can still be tricked into entering codes on phishing sites, which we've seen in adversary-in-the-middle attacks targeting energy companies.

Push Notifications Push-based MFA sends a notification to your phone asking you to approve or deny a login attempt. It's convenient but vulnerable to "push bombing" or "MFA fatigue" attacks, where attackers spam approval requests until a frustrated user hits "Accept" by mistake.

Hardware Security Keys Physical devices like YubiKeys provide the strongest protection. They use FIDO2/WebAuthn standards and cryptographically bind authentication to specific domains, making phishing technically impossible. The key won't respond to a fake site even if it looks identical to the real one.

Passkeys The newest MFA method, passkeys use the same FIDO2 cryptography as hardware keys but store credentials on your device (phone, laptop, or password manager). They're phishing-resistant and don't require carrying a separate device.

Why Traditional MFA Isn't Enough Anymore

Here's the uncomfortable truth: standard MFA—including authenticator apps and push notifications—can be bypassed. Attackers have developed multiple techniques:

Adversary-in-the-Middle (AitM) Phishing The attacker sets up a proxy between you and the legitimate site. When you enter your credentials and MFA code, the proxy captures everything and uses it to authenticate in real-time. We covered this exact technique in our breakdown of how phishing attacks work.

Push Bombing Attackers repeatedly trigger MFA push notifications until the user approves one out of frustration or confusion. This technique contributed to breaches at major companies including Uber.

SIM Swapping For SMS-based MFA, attackers convince your carrier to transfer your phone number to their SIM card. They then receive your authentication codes directly.

Session Token Theft Some attacks skip MFA entirely by stealing the authenticated session cookie after you've logged in. The Microsoft Tycoon2FA campaign used this approach at scale.

Phishing-Resistant MFA: The New Standard

CISA now recommends phishing-resistant MFA as the security baseline for all organizations. This means FIDO2-based authentication—hardware security keys or passkeys—rather than SMS codes or push notifications.

Phishing-resistant MFA works because it cryptographically verifies the website you're logging into. A fake site can't trigger the authentication response, even if it looks pixel-perfect. The private key never leaves your device, and there's no code for attackers to intercept.

Microsoft now mandates MFA for Microsoft 365 admin centers as of February 2026. Other organizations are following suit. If you're still relying on SMS codes, it's time to upgrade.

How to Enable MFA on Your Accounts

Most major services now support MFA. Here's how to enable it on common platforms:

Google: Go to Security settings → 2-Step Verification → Get started Microsoft: Visit account.microsoft.com → Security → Advanced security options Apple: Settings → [Your Name] → Password & Security → Two-Factor Authentication Banking apps: Check your bank's security settings or contact customer support

For the best protection, use a hardware security key or passkey where available. Authenticator apps are a solid fallback. Avoid SMS if other options exist.

MFA for Organizations

If you're implementing MFA across an organization, consider these points:

  • Start with privileged accounts: Admins and users with access to sensitive data should be your first priority. These are the accounts attackers target most.
  • Choose phishing-resistant methods: FIDO2 security keys are worth the investment, especially for high-risk roles.
  • Don't allow fallback to weak methods: Conditional access policies should require phishing-resistant MFA without offering SMS as a backup.
  • Plan for lost devices: Have a recovery process ready before users lose their authentication devices.

The access control principles we covered in our guide to access control models and best practices apply here too—MFA is part of a broader identity and access management strategy.

Frequently Asked Questions

Is MFA the same as 2FA? Two-factor authentication (2FA) is a subset of MFA. 2FA specifically requires exactly two factors, while MFA means two or more. In practice, most implementations use two factors, so the terms are often used interchangeably.

Can MFA be hacked? Yes, but it's significantly harder than hacking a password-only account. Traditional MFA methods like SMS and authenticator apps can be bypassed through phishing and social engineering. Phishing-resistant MFA using FIDO2 passkeys or hardware keys is currently the most secure option available.

What happens if I lose my MFA device? Most services offer backup options—recovery codes, backup phone numbers, or secondary authentication methods. Store recovery codes securely (not in the same place as your passwords) and register backup devices where possible.

Related Articles