Security & privacy

Microsoft is scrapping SMS 2-factor authentication because it's 'a leading source of fraud'

At a glance:

  • Microsoft is discontinuing SMS-based two-factor authentication for personal accounts due to security vulnerabilities.
  • The company will promote passwordless alternatives like passkeys and verified email to combat evolving fraud tactics.
  • SMS 2FA has become a primary attack vector, with Microsoft citing its role in enabling unauthorized account access.

The Evolution of Authentication Risks

For years, SMS-based two-factor authentication (2FA) has been a cornerstone of digital security, relying on text message codes to verify user identities during login attempts. While once considered a robust safeguard, this method has increasingly fallen prey to sophisticated attack vectors. Bad actors now exploit vulnerabilities through SIM swapping attacks, phishing scams, and network-level exploits to intercept SMS codes, effectively bypassing this security layer. Microsoft's documentation explicitly acknowledges this shift, stating that SMS authentication has transformed from a protective measure into "a leading source of fraud." This erosion of trust stems from fundamental limitations in SMS technology, including its reliance on cellular networks and susceptibility to social engineering tactics that compromise the physical security of mobile devices.

Microsoft's Strategic Pivot

In response to these mounting threats, Microsoft has formally announced the discontinuation of SMS-based 2FA for personal accounts through official documentation titled "Microsoft to stop sending SMS codes for personal accounts." The company frames this transition as part of a broader evolution toward passwordless authentication, emphasizing that "SMS-based authentication is now a leading source of fraud." By moving toward verified email and passkey systems, Microsoft aims to create a more secure and user-friendly authentication ecosystem. This decision aligns with the company's existing initiatives, as new Microsoft accounts already default to passwordless configurations. The shift represents a significant policy change that will affect millions of users worldwide who currently rely on SMS codes for account verification.

The Rise of Passwordless Solutions

Microsoft is championing passkeys as the primary replacement for SMS 2FA, positioning them as the future of secure authentication. Passkeys leverage public-key cryptography to enable a "secret handshake" between the user's device and the server, eliminating the need for human-entered codes or passwords. This cryptographic exchange occurs automatically during login, requiring only device possession or biometric verification. Unlike SMS codes, passkeys cannot be intercepted through traditional phishing methods since they don't transmit shared secrets over networks. Microsoft highlights that this approach not only enhances security but also simplifies the user experience by removing friction from the authentication process. The company encourages users to create passkeys through their account settings, ensuring seamless access across compatible platforms.

Technical Advantages of Passkeys

The security benefits of passkeys over SMS 2FA are multifaceted and rooted in cryptographic principles. Passkeys are device-bound, meaning they cannot be remotely accessed even if an attacker compromises the user's password or SIM card. They utilize strong asymmetric encryption protocols that are computationally infeasible to break, unlike SMS codes which can be brute-forced or intercepted. Additionally, passkeys support phishing resistance by design, as they only work with the specific websites and applications they were created for. Microsoft emphasizes that this approach aligns with industry standards promoted by the FIDO Alliance, ensuring interoperability across different platforms and devices. The system also enables automatic credential rotation, further reducing the risk of long-term credential exposure.

User Migration and Implementation Timeline

As Microsoft transitions away from SMS 2FA, users will need to proactively update their authentication methods to maintain account access. The company recommends creating passkeys through the Microsoft account security settings, which can be stored on personal devices like smartphones or security keys. For users unable to adopt passkeys immediately, Microsoft will continue supporting alternative secure methods such as authenticator apps, which remain more resistant to SIM swapping attacks than SMS codes. While the documentation doesn't specify an exact sunset date for SMS 2FA, users should expect gradual phase-out notices in their account settings. Microsoft is likely to implement this change regionally to ensure smooth migration, potentially starting with enterprise accounts before expanding to personal users worldwide.

Industry-Wide Security Implications

Microsoft's decision reflects a broader industry consensus about the inadequacy of SMS-based authentication in modern threat landscapes. Major tech companies including Google and Apple have already reduced reliance on SMS 2FA in favor of hardware security keys and biometric verification. This shift underscores a fundamental rethinking of authentication priorities, moving from convenience to cryptographic robustness. The move also signals growing regulatory pressure, as bodies like the EU's Digital Services Act increasingly mandate stronger security measures for online services. As cyber threats evolve, passwordless authentication is expected to become the standard across sectors, with Microsoft's adoption potentially accelerating this transition. Industry analysts predict that similar announcements from other major platforms could follow within the next 12-18 months.

Editorial SiliconFeed is an automated feed: facts are checked against sources; copy is normalized and lightly edited for readers.

FAQ

Why is Microsoft removing SMS 2FA?
Microsoft is discontinuing SMS-based two-factor authentication because it has become a leading source of fraud. Attackers exploit vulnerabilities like SIM swapping and phishing to intercept SMS codes, making this authentication method insecure. The company aims to enhance security by promoting more robust alternatives like passkeys and verified email.
What authentication methods will Microsoft use instead?
Microsoft will promote passwordless authentication methods, primarily passkeys and verified email. Passkeys use cryptographic protocols to create a secure login without passwords, while verified email provides an additional security layer. These methods are more resistant to phishing and SIM swapping attacks compared to SMS codes.
How do passkeys work and why are they more secure?
Passkeys leverage public-key cryptography to perform a secure 'handshake' between the user's device and server. They don't rely on shared secrets like passwords or SMS codes, making them immune to phishing. Additionally, passkeys require physical possession or biometric verification, adding an extra layer of security against remote attacks and credential theft.

More in the feed

Prepared by the editorial stack from public data and external sources.

Original article