Back to Blog

AI Phishing Bypasses 2FA: How to Keep Your Business Safe

AI Phishing Bypasses 2FA: How to Keep Your Business Safe
March 24, 2026 | David Velarde Robles David Velarde Robles

Stop Hackers Even With 2FA: The New AI Phishing Threat

Imagine a thief who doesn’t need to pick your lock—they just convince you to hand them the key. That’s exactly what a new wave of phishing attacks is doing, even to businesses that use two-factor authentication (2FA). These attacks are getting smarter, faster, and more convincing, and they’re targeting companies of all sizes.

If you run a small business—a bakery, a dental clinic, a webshop, or even a freelance service—this isn’t just a tech problem. It’s a real risk to your data, your money, and your reputation. Here’s what you need to know and how to protect yourself.


The Phishing Problem, Reimagined

Phishing is nothing new. It’s the digital equivalent of a scammer calling you to say you’ve won a lottery you never entered. The goal? Trick you into clicking a link, entering your password, or downloading a malicious file.

But now, cybercriminals have upgraded their tools. Instead of sending poorly written emails with obvious mistakes, they’re using AI-powered phishing kits—rentable services that make attacks easier, faster, and harder to spot. Think of it like a criminal renting a high-tech toolkit instead of breaking in with a crowbar.

How These Attacks Bypass 2FA

Most businesses rely on 2FA as an extra layer of security. After entering your password, you get a code on your phone or email—something only you should have access to. But these new attacks use a trick called “adversary-in-the-middle” (AitM). Here’s how it works:

  1. You click a link in what looks like a legitimate email (e.g., from your bank, a supplier, or even a colleague).
  2. The link takes you to a fake login page that looks real—because it’s generated by AI to mimic your actual website.
  3. When you enter your password and 2FA code, the attacker intercepts them in real time.
  4. They use your stolen credentials to log in to your real account, bypassing your security.

It’s like a delivery driver intercepting a package meant for you and pretending to be the real recipient. By the time you realize something’s wrong, the damage is already done.

Why These Attacks Keep Coming Back

Recent crackdowns by authorities have disrupted some of these cybercrime tools, but they’re back—and stronger than ever. This shows how hard it is to stop them permanently. Even if one tool gets taken down, others pop up to take its place. For business owners, this means you can’t rely on 2FA alone. You need a layered approach to security.


AI Makes Phishing More Convincing

In the past, phishing emails were easy to spot. Poor grammar, weird links, and obvious scams gave them away. But AI has changed the game. Here’s how:

1. AI-Generated Decoy Pages

Attackers aren’t just copying your website—they’re creating new, convincing ones on the fly. These pages look identical to your bank’s login screen, your email provider, or even your internal tools. And because they’re generated by AI, they don’t have the typos or mistakes that used to give them away.

Cybercriminals are getting smarter about disguising their links. They use:

  • URL shorteners (like bit.ly) to hide the real destination.
  • Legitimate platforms (e.g., Google Docs, presentation tools) to host malicious content.
  • Compromised domains (hacked websites) to make links look trustworthy.

3. What Happens After You Click

If an employee falls for one of these attacks, the damage doesn’t stop at stolen credentials. Attackers often:

  • Create hidden folders in email accounts to hide fraudulent messages.
  • Set up inbox rules to automatically forward sensitive emails to their own accounts.
  • Use your compromised account to launch attacks on your customers, suppliers, or partners.

For a small business, this could mean:

  • Financial loss (stolen funds, fraudulent transactions).
  • Data breaches (customer information, sensitive business data).
  • Reputation damage (losing trust with clients and partners).

What This Means for Your Business

The Scale of the Problem

These AI-powered phishing tools aren’t just a theoretical risk—they’re actively targeting businesses like yours. One of these kits alone generates millions of phishing emails per month. If you’re not prepared, it’s not a question of if you’ll be targeted, but when.

Even 2FA Isn’t Enough

2FA is a great security measure, but it’s not foolproof. These attacks show that you need more than just one layer of protection. Here’s what you can do:

1. Train Your Team

  • Teach employees to never click links in emails, even if they look legitimate.
  • Use real-world examples (e.g., a fake invoice from a “supplier” or a “password reset” email).
  • Run phishing simulations to test awareness (many email security tools offer this).

2. Use Email Security Tools

  • Invest in email filtering that scans for malicious links and attachments.
  • Look for tools that flag suspicious emails before they reach your inbox.

3. Enable Advanced Security Features

  • Multi-factor authentication (MFA) with app-based codes (like Google Authenticator or Microsoft Authenticator) is harder to bypass than SMS-based 2FA.
  • Conditional access policies (e.g., only allowing logins from trusted devices or locations).

4. Monitor for Unusual Activity

  • Set up alerts for suspicious logins (e.g., from unfamiliar locations or devices).
  • Regularly check email rules and hidden folders for signs of compromise.

FAQ: What Business Owners Need to Know

Q: How do I know if my business has been targeted?

A: Look for signs like:

  • Unexpected password reset emails.
  • Emails marked as “read” that you didn’t open.
  • Strange inbox rules or hidden folders.
  • Customers or suppliers reporting suspicious emails from your account.

If you notice any of these, change your passwords immediately and check for unauthorized access.

Q: My team is small—do we really need to worry about this?

A: Absolutely. Cybercriminals don’t just target big companies. Small businesses are often easier targets because they may not have strong security measures in place. Plus, attackers can use your compromised accounts to target your customers or partners.

Q: What’s the first step I should take to protect my business?

A: Start with employee training. Most attacks rely on human error—if your team knows what to look for, they’re less likely to fall for scams. Next, enable MFA and use email security tools to filter out malicious messages.


IT Move NL

Whether you run a tech team or a local bakery, cybersecurity affects how you do business online. These new AI-powered threats might sound complex, but the solutions don’t have to be. We help businesses of all sizes—from clinics to logistics companies—figure out their next digital step. Let’s talk about how to keep your business safe, without the jargon.


Sources:

David Velarde Robles
David Velarde Robles

He/Him · AWS Certified Solutions Architect | Cloud Engineer @ Essent

Cloud Engineer at Essent B.V. with 10+ years of experience in the tech industry. AWS Certified, passionate about serverless architectures, Infrastructure as Code, and DevOps. Proficient in TypeScript, Python, and Terraform. Based in Amersfoort, Netherlands.

>

STAY IN THE LOOP

// Cloud, AI & DevOps insights — straight to your inbox.

>

No spam. Unsubscribe anytime.

Share this article:

Need help with your cloud infrastructure?

Our team of experts is ready to help you navigate the complexities of modern cloud architecture.

Get in Touch