
Gmail And Microsoft 2FA Security Bypass — Take Action Now, Users Told
Enable passkeys as 2FA bypass attacks confirmed.
Update, April 14, 2025: This story, originally published April 13, has now been updated with more information from Trustwave detailing how attackers obfuscate their 2FA bypass phishing threats.
I'm sorry to have to tell you this, but if you didn't already realize, you are under attack. No matter the operating system you use, the applications you rely upon or the faith you have in Big Tech to protect you, attackers are coming for your accounts and your data. The higher the profile of those accounts, the more valuable they are and the more hacking scrutiny they are under. Which is why we see security warnings involving such things as Apple ID attacks, X social media data leaks, and both Android and iPhone smartphone FBI defense advice. It is, however, Gmail and Microsoft that are most valued by hackers for the data that a successful account hack can expose. News of the evolution of an already perilous threat that can bypass 2FA protections that both Google and Microsoft have in place is, therefore, naturally of huge concern. Here's what you need to know and what both tech giants say you must do right now.
Tycoon 2FA is not a new threat, far from it, in fact. As I reported March 26, 2024, the adversary-in-the-middle attack kit first came to the attention of threat intelligence experts in 2023. In March 2024, however, the criminal developers behind it turned the threat dial up a notch or two by releasing an update that specifically targeted Microsoft 365 and Gmail account holders and employed advanced obfuscation and anti-detection capabilities.
Those attackers have, it seems, now turned the dial to 11.
New intelligence from security researchers at Trustwave has revealed even more sophisticated evasion techniques being deployed against Gmail and Microsoft users in the latest 2025 attacks. According to the new report's authors, Trustwave's Phil Hay and Rodel Mendrez, these include 'using a custom CAPTCHA rendered via HTML5 canvas, invisible Unicode characters in obfuscated JavaScript, and anti-debugging scripts to thwart inspection.'
While conceding that none of these techniques are groundbreaking, individually at least, combining them does pose a new threat that makes detection and response even more difficult. Custom CAPTCHA visuals in HTML5, for example, can add legitimacy to phishing attempts, Unicode and Proxy-based obfuscation can delay detection, and anti-debugging behaviors hide malicious activity from automated tools.
Bernard Bautista and Kevin Adriano, also working at Trustwave, have reported how threat actors are using harmless-looking images to hide what are actually dangerous links in a phishing attack. Not just using, but employing them in what the researchers have described as a 'major spike' in this type of attack obfuscation.
The attacks are ones that exploit the fact that Scalable Vector Graphics image files are based on the Extensible Markup Language, unlike more typical image formats, and that means they can contain interactive scripts. 'SVG-based attacks have sharply pivoted toward phishing campaigns,' the report warned, 'with a staggering 1800% increase in early 2025 compared to data collected since April 2024.' Notably, a large surge in such campaigns has been observed during the first quarter of 2025, driven 'largely by the emergence of Attack-in-the-Middle, Phishing-as-a-Service, platforms such as Tycoon2FA,' the researchers said.
SVG files are popularly, and perfectly legitimately, used in web design and branding campaigns due to their sharp image output, but the researchers warned that their ability to embed JavaScript introduces serious cybersecurity risks. Attackers use this to inject malicious scripts directly into the image files, which can then 'execute automatically upon opening the file, enabling a wide range of cyberattacks, including unauthorized system access, data theft, identity compromise, and leakage of sensitive information.'
The problem is, if it really needed any further explanation, that these malicious scripts can be executed without the need for explicit user interaction, and they are more difficult for security tools to detect and block. Plus, of course, the small matter of people having an elevated yet false sense of security when it comes to images, including SVG files, which are often treated as being of no risk at all.
Trustwave recommended that security teams should 'consider behavior-based monitoring, browser sandboxing, and a deeper inspection of JavaScript patterns' in order to stay one step ahead of the Tycoon 2FA attackers. Google and Microsoft, however, have some more straightforward advice for ordinary users when it comes to protecting themselves and their valuable accounts from the 2FA bypass hackers.
The simple truth is that, from the end user defensive posture perspective, the mitigation advice when it comes to Tycoon 2FA attacks is the same now as it was in 2024, namely, use passkeys.
A Google spokesperson said that 'passkeys substantially reduce the impact of phishing and other social engineering attacks. Google research has shown that security keys provide a stronger protection against automated bots, bulk phishing attacks, and targeted attacks than SMS, app-based one-time passwords, and other forms of traditional two-factor authentication.'
Meanwhile, a Microsoft spokesperson said, 'As a security best practice, we encourage customers to always practice good computing habits online, including exercising caution when clicking on links to web pages, opening unknown files, or accepting file transfers. In addition, we recommend switching to Passkeys wherever possible and using authentication apps such as Microsoft Authenticator, which warn users about potential phishing attempts.'
So, there you have it: use passkeys to protect your Gmail and Microsoft accounts, not only against this 2FA bypass attack but also against other potential threats. What are you waiting for, do it now.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
2 hours ago
- Forbes
Study Shows LLM Conversion Rate Is 9x Better — AEO Is Coming
Bing, OpenAI, Microsoft and Google logos displayed on a phone screen and a laptop keyboard are seen ... More in this multiple exposure illustration photo taken in Krakow, Poland on February 8, 2023. (Photo by Jakub Porzycki/NurPhoto via Getty Images) Some predict that by 2028, more people will discover products and information through large language models (LLMs) like ChatGPT and Gemini than through traditional search engines. But based on research I conducted with Cornell Master's students, that shift is happening much faster. LLM-driven traffic is already starting to outperform traditional search — not in volume, but in value. Traffic from LLMs converts at nearly 9x higher rates than traditional search. This is the biggest disruption to search since the dawn of the internet. If you're a brand or publisher, now is the time to adapt your SEO playbook. Oh, there is no 'S' — it's now called Answer Engine Optimization (AEO) Back in January, I predicted that traditional search was on its way out. Just six months later, the shift is already visible. In my UX research, I classify shoppers into three categories: It's easy to see how all these needs can now be met through a conversation with LLMs like ChatGPT, Claude, Gemini, or Perplexity. Say you're looking for an isotonic drink powder. Instead of scanning blogs, watching videos, or scrolling endlessly, you now ask ChatGPT — and it responds with direct recommendations: Ask about ketogenic-friendly options, and it will go even further — offering details on ingredients, comparisons, and alternatives. Staff Sergeant Alex Mackinnon from the Royal Electrical and Mechanical Engineers holds a sachet of ... More isotonic drink, Tuesday September 20, 2005, at Bramley Training Area near Basingstoke, where the Army announced it will be including the sports drink in its ration packs. The powdered drink will be incorporated in 24-hour ration packs after the its producer, GlaxoSmithKline, won the three-year contract in a tendering process. See PA Story DEFENCE Drink. PRESS ASSOCIATION Photo. Photo credit should read: Chris Ison/PA (Photo by Chris Ison - PA Images/PA Images via Getty Images) This isn't search — it's advice. And when users follow those links or act on suggestions, they convert at dramatically higher rates compared to normal search traffic. In my studies, LLM-generated traffic behaves more like a personal recommendation than a keyword query. But here's the catch: if your brand isn't listed, you're invisible. The customer won't even consider you. Good numbers are hard to come by. LLM traffic, like what comes from ChatGPT, doesn't always leave a clean trail — users might just copy and paste a product name and head to Amazon or another site. To get better data, we created a ChatGPT-style experience inside the site search of several e-commerce stores. In A/B tests, we compared regular keyword search with an AI-guided, conversational search experience. The difference was stunning: almost 9x higher conversion. Yes, nine times. But it's not just conversion that's changing — the way people search is evolving, too. In the past, users typed one or two words like 'camera.' Now, when they're shown more natural and detailed responses, they respond in kind. We're seeing queries like: 'What's a compact camera for wildlife photography that fits in a carry-on?' Semrush backs this up with broader data: In our interviews, shoppers said they felt more 'understood' and 'better about their purchase.' It didn't feel like a search engine. It felt like getting advice from a knowledgeable friend. If you scale that behavior to external LLM traffic — not just on-site — the value of that traffic already rivals what you get from SEO. For brands, this means it's time to rethink how you show up in these conversations. That's what AEO — Answer Engine Optimization — is all about. Brands need to act. If you're not being cited by LLMs, you're becoming increasingly invisible. To get picked up by an LLM, you need to understand how these models learn from content. Masking in ML Training LLMs are pattern-completion engines. I often use the example of 'Life is like a box of ___' in my online certificate from Cornell. Correct. The answer is Chocolate. Machines learn the right answer through trial and error. This approach is called masking. To show up in an LLM's response, your content needs to become part of its masked training data. LLMs look for authoritative, helpful, and authentic content. Since they predict the next word in a conversation with a user, they favor content written in a conversational or Q&A format. For brands a new playbook is emerging AEO. I outlined all what brands need to know. AEO is just the beginning. Two even bigger shifts are on the horizon — and both will deeply impact how brands show up in the age of AI: Paid Ads in LLMs and Model Context Protocol and agents that act on behalf of the LLM. The future is already underway. Ping me on LinkedIn if you want to continue the conversation.
Yahoo
3 hours ago
- Yahoo
OPINION: Why 'least privilege' is Canada's best defence
Microsoft just hit a record high of 1,360 reported vulnerabilities in its software last year. While that number might sound scary, it's part of a trend we've seen for years. The real problem lies in what's behind the numbers and what they mean for Canadian businesses trying to stay secure in a fast-moving world. As BeyondTrust's latest Microsoft Vulnerabilities Report reveals, one type of security risk is especially alarming: elevation of privilege (EoP). This category made up 40 per cent of Microsoft's total reported vulnerabilities in 2024. That's not just a statistic; it's a wake-up call. What's elevation of privilege and why should Canadians care? Imagine someone finds a way to break into your office using a stolen key card. That's what an elevation of privilege attack is like in the digital world. Once inside, hackers can quietly move through your systems, taking control of sensitive data or expanding their access without being noticed. These attacks often begin with compromised credentials, sometimes even from non-human identities like service accounts. The problem snowballs from there. We've seen it over and over in major data breaches: attackers find one weak point, then jump from system to system. And Microsoft isn't the only target. If 40 per cent of their vulnerabilities are EoP-related, imagine how many other software platforms that Canadian companies rely on could also be vulnerable. The rise of security feature bypass attacks Another disturbing trend is the spike in security feature bypass vulnerabilities, up 60 per cent since 2020. These are loopholes hackers use to get around built-in protections in tools like Microsoft Office and Windows. Think of these bypasses as digital 'unlocked doors.' If an attacker finds one, it doesn't matter how strong your locks are, they're walking right in. Tools like EDR (endpoint detection and response) are meant to stop threats, but attackers are finding ways around them too. We've seen the rise of tools like EDR Killer that are designed specifically to sneak past these defences. Why Canadian companies can't rely on just one layer of security Some businesses still make the mistake of thinking one product or platform will keep them safe. But cybersecurity isn't about one silver bullet. It's about layered defences, also known as 'defence in depth.' For example, if a patch causes problems or breaks other tools, companies might delay applying it. But that delay gives attackers a window of opportunity. The better approach? Have multiple layers of protection in place, especially for front-line systems and high-risk assets. Microsoft Edge: The new problem child? One surprise in this year's report was the jump in Microsoft Edge vulnerabilities. Critical issues rose from 1 to 9 and total vulnerabilities increased from 249 to 292. Has Microsoft shifted its focus too much toward Azure and Dynamics 365? It's a question worth asking, especially when everyday tools like browsers are often the first entry point for cyberattacks. AI brings new benefits and new risks Artificial Intelligence (AI) is transforming how businesses operate, but it's also opening the door to new threats. Microsoft Copilot Studio and Azure Health Bot, for instance, were flagged for AI-related vulnerabilities in this year's report. AI is already being used by threat actors to automate attacks, identify weaknesses faster and even write malicious code. We haven't yet seen a large-scale attack where an AI or large language model (LLM) becomes the main infection point, but that day is coming. The biggest question on the horizon: can we trust the output from AI tools? What if the answers, code or insights we get from AI are secretly manipulated by a hacker? Canadian companies need to think about how to secure not just their AI tools, but also the data and systems that feed them. AI security can't be an afterthought; it must be built into every layer of your defence strategy. The power of 'least privilege' in a 'zero-trust' world One of the most effective ways to reduce risk is by applying the principle of 'least privilege.' It's not a new idea, but it's more important than ever. 'Least privilege' means giving every user—human or machine—only the access they absolutely need to do their job. Nothing more. If someone doesn't need admin rights, don't give it to them. If a service account only needs access to one system, don't let it roam freely. This approach limits the damage if (or when) something goes wrong. It's also a key part of a 'zero-trust strategy,' which assumes no one and nothing should be trusted automatically, even if they're already 'inside' your network. In fact, many organizations confuse 'zero trust' with 'least privilege.' The difference is that 'zero trust' is the overall strategy, and 'least privilege' is a tactical way to enforce it. A practical step Canadian companies can take right now? Audit your users and systems. Who has access to what and why? You might be shocked by how many people or services have more access than they actually need. Identities are the new perimeter Cybersecurity used to be about building firewalls around a company's data centre. But in today's world of cloud apps, hybrid work and global supply chains, identity is the new perimeter. Attackers are no longer just looking for software flaws. They're targeting people, especially those with access and privileges. That includes your employees, partners, contractors and even automated systems. That's why privilege access management (PAM) and identity-first security strategies are so critical for Canadian businesses. These approaches don't just monitor threats; they help stop them at the source by locking down who can do what, where and when. The bottom line going forward Cybersecurity isn't about being perfect; it's about being proactive. You can have 99.9 per cent of your environment locked down, but if there's a .01 per cent vulnerability, that's all an attacker needs. Canadian organizations need to shift their mindset from reactive to proactive. That means applying patches smartly, layering defences, adopting AI cautiously and putting 'least privilege' at the heart of your security program. Because when it comes to protecting your business, every identity and every privilege matters. Dan Deganutti is the senior vice president and country manager for Canada at BeyondTrust, where he leads the company's Canadian go to market (GTM) operations and fosters relationships with clients and business partners. This section is powered by Revenue Dynamix. Revenue Dynamix provides innovative marketing solutions designed to help IT professionals and businesses thrive in the Canadian market, offering insights and strategies that drive growth and success across the enterprise IT spectrum. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data
Yahoo
4 hours ago
- Yahoo
Why IBM Is the Best Quantum Computing Stock to Buy Right Now
IBM is a quantum computing pioneer. The company expects to reach true quantum advantage by 2026 and have a large fault-tolerant system in place by 2029. With a long track record and a clear roadmap, IBM is emerging as a quantum computing leader. 10 stocks we like better than International Business Machines › A future quantum computer could potentially solve problems that are essentially impossible for even the most powerful supercomputer. The magic comes from the nature of quantum physics. While traditional computers operate on bits that can be in only one of two states, a quantum qubit is probabilistic, occupying some combination of those two states. This property opens the door to exponentially faster computations. Today's quantum computers generally aren't capable of solving real-world problems quicker than traditional computers. They are capable of performing some types of computations faster, but these computations are more toy problems than anything else. When Alphabet's Google unveiled its Willow quantum chip last year, it claimed that Willow could perform a particular benchmark in five minutes that would take a supercomputer 10 septillion years. Unfortunately, that benchmark has no known real-world applications. Another problem is error correction. Qubits are fragile, and errors are inevitably introduced over the course of a computation. Those errors must be prevented, corrected, or otherwise mitigated for long enough for a computation to be completed. Microsoft made some noise on this front earlier this year with its Majorana 1 quantum chip, which uses exotic particles to create more robust qubits. However, the company is in the early stages of scaling this technology, and it could very well be many years before anything useful comes out of it. International Business Machines (NYSE: IBM), a quantum computing pioneer, now sees a path to full-scale quantum error correction by 2029 and true quantum advantage by the end of 2026. The company has a clear roadmap, and if it can deliver, quantum computing could turn into a major business for the century-old tech giant. IBM is taking a modular approach on its path to the holy grail of quantum computing. This year, IBM will release Nighthawk, its new quantum process with 120 qubits and 5,000 quantum gates. Over the next few years, successive versions of Nighthawk will increase the number of gates, culminating in 2028 with a 15,000-gate version that can be linked together in groups of nine. IBM believes Nighthawk will be able to achieve true quantum advantage. Nighthawk is a stepping stone toward Starling, the fault-tolerant quantum computer planned for 2028. To build Starling, IBM will release three iterations of quantum chips over the next few years that include the necessary technology to make Starling a reality. IBM Quantum Loon comes this year, featuring greater connectivity than the company's current quantum chips. IBM Quantum Kookaburra comes in 2026, bringing the ability to store information and process it with an attached processing unit. And IBM Quantum Cockatoo is set for 2027, allowing entanglement between modules. Starling, which will feature 200 logical qubits and 100 million quantum gates, will be built in 2028 and deliver fault-tolerance by 2029, according to IBM's roadmap. Plenty of companies are racing toward viable quantum computing, but IBM has two things that make it unique: a decades-long track record researching and building quantum computers, and a clear roadmap to reach fault-tolerance and true quantum advantage. While it's impossible to predict how large of an opportunity quantum computing could be for IBM, one estimate puts the economic value generated by quantum computing at $850 billion by 2040, with the market for quantum hardware and software potentially worth $170 billion. If IBM can truly pull ahead of its rivals and deliver real-world results with its quantum computers by the end of the decade, it will be in a great position to reap the rewards of the quantum computing revolution. IBM's valuation today looks reasonable considering the enormous potential of quantum computing. Based on the company's outlook for 2025, IBM stock trades for roughly 19 times free cash flow. While the stock isn't as cheap as it was a few years ago, IBM still looks like a solid buy. The company's hybrid cloud and artificial intelligence (AI) businesses are driving growth today, and quantum computing has the potential to drive growth in the 2030s and beyond. Before you buy stock in International Business Machines, consider this: The Motley Fool Stock Advisor analyst team just identified what they believe are the for investors to buy now… and International Business Machines wasn't one of them. The 10 stocks that made the cut could produce monster returns in the coming years. Consider when Netflix made this list on December 17, 2004... if you invested $1,000 at the time of our recommendation, you'd have $658,297!* Or when Nvidia made this list on April 15, 2005... if you invested $1,000 at the time of our recommendation, you'd have $883,386!* Now, it's worth noting Stock Advisor's total average return is 992% — a market-crushing outperformance compared to 172% for the S&P 500. Don't miss out on the latest top 10 list, available when you join . See the 10 stocks » *Stock Advisor returns as of June 9, 2025 Suzanne Frey, an executive at Alphabet, is a member of The Motley Fool's board of directors. Timothy Green has positions in International Business Machines. The Motley Fool has positions in and recommends Alphabet, International Business Machines, and Microsoft. The Motley Fool recommends the following options: long January 2026 $395 calls on Microsoft and short January 2026 $405 calls on Microsoft. The Motley Fool has a disclosure policy. Why IBM Is the Best Quantum Computing Stock to Buy Right Now was originally published by The Motley Fool Sign in to access your portfolio