WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Phishing Attacks that Bypass 2FA Just Got Easier
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Phishing Attacks that Bypass 2FA Just Got Easier

Author: Jennifer Walker

Created: Thursday, January 10, 2019 - 17:48

Categories: Cybersecurity

In mid-December, human rights organization, Amnesty International reported having been the victim of two phishing campaigns, likely by the same attackers. Amnesty reported the attackers bypassed two-factor authentication (2FA) methods to steal credentials to obtain and maintain access to hundreds of victim’s Google and Yahoo accounts. Two weeks later, a Polish researcher released a tool into open source that will make attacks like what happened to Amnesty International much more common, and dangerous. The tool, named “Modlishka,” has been released for (and with) good-intentions; however, like many that have come before it (e.g., Shodan, Censys, Metasploit), it is also available to any “script-kiddie” with a computer and little to no technical skills. Modlishka enables anyone to set up automated phishing campaigns within minutes. The researcher’s goal in releasing this tool to the public is in part to raise the level of awareness at how trivial it is to bypass 2FA based on SMS and one-time codes, in hopes the threat will be better addressed through more efficient controls, such as U2F-based schemes that rely on hardware security keys, and increased awareness training. ZDNet

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar