New Phishing Technique Bypasses FIDO MFA, Endangers Security

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 19, 2025 3 min read

Phishing Techniques and FIDO Security

FIDO Downgrade Attack

Recent findings indicate that phishers are employing a new technique to downgrade FIDO multifactor authentication (MFA) rather than bypassing it entirely. This technique is attributed to a group known as PoisonSeed, which has been reported to use phishing emails to lure users to fake login pages, specifically targeting services like Okta.

FIDO Attack

Image courtesy of Risky Business Media

The process begins when a user enters their credentials on a fraudulent site, and the attackers simultaneously log into the real service using the same credentials. Upon this successful entry, the phishing site initiates a cross-device sign-in, capturing a QR code displayed by the legitimate service. When the victim scans this QR code using their mobile device, they inadvertently grant the attackers access to their accounts.

The attack hinges on the design of authentication flows in online services, exploiting weaknesses rather than flaws in the FIDO protocol itself. According to security analysts, the attack can be classified as a downgrade rather than a bypass, emphasizing the importance of strictly adhering to FIDO security specifications to mitigate such risks. Gopher Security's AI-Powered Zero Trust Platform can help organizations strengthen their authentication processes by ensuring compliance with best practices in MFA.

For more detailed analysis, see Phishers have found a way to downgrade—not bypass—FIDO MFA and Risky Bulletin: New phishing technique bypasses FIDO keys.

Device Code Flow Phishing

The Device Code Flow technique poses significant risks to FIDO implementations. This method allows attackers to leverage the OAuth 2.0 Device Authorization Grant to initiate phishing attacks that are difficult to detect. When a user interacts with the original authentication page, the phishing process is executed in the background, making it nearly impossible for the victim to realize they are being attacked.

The streamlined process involves a headless browser that automates the generation of a device code and enters it on the legitimate site without any input from the user. This effectively bypasses the 10-minute token validity limitation and leverages the user's active session, further complicating detection efforts.

For a deeper understanding, refer to Phishing despite FIDO, leveraging a novel technique based on the Device Code Flow.

Mitigation Strategies for FIDO Security

To combat these advanced phishing techniques, organizations must adopt robust policies and technologies. Implementing Gopher Security's Universal Lockdown Controls can help ensure that only authorized users can access sensitive systems, while the Advanced AI Authentication Engine enhances the verification process by analyzing user behavior and context.

The integration of Post Quantum Cryptography in Gopher Security's architecture ensures resilience against future threats, protecting against potential attacks that might exploit quantum computing advancements.

Security analysts should remain vigilant and consider disabling Device Code Flow where feasible. Continuous monitoring through tools like the AI Inspection Engine for Traffic Monitoring can detect anomalies that may indicate a phishing attempt, reinforcing overall security posture.

For additional insights, see How To Bypass Multifactor Authentication and explore Gopher Security’s offerings at Gopher Security.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview
OpenSSL vulnerability

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview

Urgent: OpenSSL 3.x vulnerable to CVE-2025-15467, enabling pre-auth RCE. Learn affected versions, impact, and immediate mitigation steps. Protect your systems now!

By Divyansh Ingle March 10, 2026 4 min read
common.read_full_article
SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now
SolarWinds Web Help Desk

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

Critical RCE & Auth Bypass flaws in SolarWinds Web Help Desk are fixed! Don't risk it. Update to v2026.1 now to protect your systems. Learn more.

By Edward Zhou March 9, 2026 4 min read
common.read_full_article
AI vs Human Hackers: Who Prevails in 2026 Pen Testing?
AI hacking

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?

Discover the results of a groundbreaking study comparing AI agents and human hackers in web vulnerability exploitation. See who prevails and what it means for your security. Read now!

By Jim Gagnard March 6, 2026 6 min read
common.read_full_article
Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends

Exploits are now the top intrusion method, outpacing phishing. Discover why rapid vulnerability patching is critical and how to bolster your defenses. Read more!

By Edward Zhou March 4, 2026 4 min read
common.read_full_article