Why SMS fails as a second factor
SMS 2FA puts your security in the hands of your phone carrier's internal processes and those processes can be manipulated by an attacker who never touches your device.
SIM swap attacks
An attacker calls your carrier, claims to be you, and convinces support staff to transfer your number to their SIM card. They then receive all your SMS codes and can reset any account linked to that number.
SS7 network interception
The SS7 protocol that routes SMS globally has known vulnerabilities. Nation-state actors and sophisticated attackers can intercept SMS in transit without touching your phone or your carrier.
Real-time phishing
Phishing kits can proxy your credentials in real time. The attacker relays your SMS code to the real site before it expires. SMS codes offer no protection against this attack.
NIST SP 800-63B has restricted PSTN-based authentication for years. CISA's 2024 Mobile Communications Best Practice Guidance went further with a direct recommendation against SMS as a second factor for authentication.
All 2FA methods, ranked
From strongest to weakest with honest notes on where each falls short.
DataLeakz's 2FA Strength Checker rates your methods and shows you where to upgrade.
Where to start upgrading
You don't need to migrate everything at once. Start where the stakes are highest.
- Your email account this is the master key. Everything else resets through here. Upgrade to passkey or authenticator app immediately.
- Your Apple, Google, or Microsoft account controls your phone, backups, and payment info.
- Banking and investment accounts some only offer SMS, but use whatever is strongest available.
- Password manager if your manager gets compromised, every other account follows.
- Work SSO / employer accounts follow your employer's policy but advocate for passkeys or hardware keys.
When you set up any strong 2FA, you'll receive one-time backup codes. Print them or store them in a password manager. Losing your authenticator app without backup codes can lock you out permanently.
Common questions
Yes, meaningfully so. SMS 2FA stops the vast majority of automated credential stuffing attacks. The risks SIM swaps, SS7 interception — require targeted effort. For most people, SMS is still a significant upgrade over passwords alone. But for high-value accounts, upgrade to something better.
The attacker calls your carrier and impersonates you, often using personal information from data breaches to convince a support rep to port your number to a new SIM they control. Once they have your number, all SMS codes go to them. They can then reset passwords on any account tied to that number.
Yes. Authy, Google Authenticator, and similar apps can hold codes for hundreds of accounts. Authy adds cloud backup (convenient but requires trusting Authy's servers). Google Authenticator now supports backup too. Use whichever you'll actually maintain with good recovery options.
Sources
- CISA Mobile Communications Best Practice Guidance (December 2024)
- NIST SP 800-63B — authentication using the public switched telephone network
- CISA MFA guidance page