Phishing tool that bypasses Gmail 2FA released on Github
The reverse proxy 'Modlishka' tool is designed to make phishing attacks as "effective as possible"


A security researcher has released a tool that can bypass a host of two-factor authentication (2FA) schemes widely used across platforms such as Gmail and Yahoo.
Polish researcher Piotr Duszyski published his tool, which uses a reverse proxy method, on GitHub alongside a step-by-step guide outlining how it can be used in a phishing scam to scalp user credentials and 2FA codes in one example against Google's security barriers.
When deployed, the tool places a server named Modlishka between a phishing target and a secure platform such as Gmail, which phishing victims unwittingly connect to in order to enter login details.
In a hypothetical phishing campaign, a targeted user would encounter a malicious email containing a link to the proxy server mimicking a Google login procedure. The user would then enter their user name and password, and then the 2FA code (received for instance via text message), all of which would be collected and held on the proxy server.
To make a success of the attack, a malicious actor would be required to monitor this process in real-time, and enter the 2FA code before it expires to gain entry.
Due to its simplicity, an attacker hypothetically using Modlishka to orchestrate a phishing campaign wouldn't need to recreate any websites themselves as is commonly done. All that's required is a phishing domain and a valid TLS certificate.
"So the question arises, is 2FA broken?" Duszyski said. "Not at all, but with a right reverse proxy targeting your domain over an encrypted, browser trusted, communication channel one can really have serious difficulties in noticing that something is seriously wrong.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Add to the equation different browser bugs, that allow URL bar spoofing, and the issue might be even bigger. Include lack of user awareness, and it literally means giving away your most valuable assets to your adversaries on a silver plate."
Duszyski has already successfully tested his tool on platforms such as Gmail and Yahoo.
The tool, which he says is for penetration testing and educational purposes only, casts doubt on 2FA as an effective layer of protection against intruders and malicious actors. Modlishka can, in particular, be used to make phishing campaigns "as effective as possible".
The only way to resolve this issue from a technical perspective, he added, was to rely on hardware tokens based on the universal 2nd-factor protocol (U2F); that is hardware devices built specifically to serve as authentication modules that do not require users to enter codes manually.
The fallibility of common 2FA routines has been exposed in recent months, particularly via a massive data breach that social news aggregator Reddit sustained last year as a result of weaknesses in its security.
After intercepting a handful of its employees' SMS-based 2FA setup and gaining access to their accounts, a malicious actor made away with a trove of user credentials, including email addresses.
Reddit's CTO Chris Slowe said following the incident that the company realised text message-based 2FA is "not nearly as secure as we would hope" and recommended that everybody moved to token-based 2FA.
Meanwhile, a strain of malware uncovered last year, known as Roaming Mantis, was reported to base Android-oriented attacks on a mechanism that cracks 2FA and hijacks users' Google accounts.
Security expert Graham Cluley told IT Pro the tool could work in practice, but that users can protect themselves against a Modlishka-centric phishing campaign by using hardware-based 2FA, or a password manager.
"Reading about Modlishka it sounds like it would work, proxying the content of the genuine site to make a phishing site very believable and intercepting any information entered, such as passwords and 2FA codes," he said.
"2FA codes tend to be time-restricted, often changing every 30 seconds. As such, an attacker may have to be monitoring the phish in real-time to maximise the account access.
"So, it's an impressive demonstration - but users should continue to use password managers, unique passwords, and enable 2FA wherever possible."

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Troy Hunt, the security blogger behind data-breach site Have I Been Pwned, has fallen victim to a phishing attack targeting his email subscriber list.
By Jane McCallion Published
-
LinkedIn has become a prime hunting ground for cyber criminals – here’s what you need to know
News Cyber criminals are flocking to LinkedIn to conduct social engineering campaigns, research shows.
By Solomon Klappholz Published
-
Phishing campaign targets developers with fake CrowdStrike job offers
News Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike
By Solomon Klappholz Published
-
Iranian hackers targeted nuclear expert, ported Windows infection chain to Mac in a week
News Fresh research demonstrates the sophistication and capability of state-sponsored threat actors to compromise diverse targets
By Richard Speed Published
-
Microsoft Authenticator mandates number matching to counter MFA fatigue attacks
News The added layer of complexity aims to keep social engineering at bay
By Connor Jones Published
-
The rise of identity-based cyber attacks and how to mitigate them
In-depth If identity-based cyber attacks are successful, they can give hackers the opportunity to infiltrate an entire network
By Sandra Vogel Published
-
As Google launches passwordless authentication for all, what are the business benefits of passkeys?
News Google follows Apple in its latest shift to passwordless authentication, but what are the benefits?
By Ross Kelly Published
-
Malware being pushed to businesses by search engines remains a pervasive threat
News High-profile malvertising campaigns in recent months have surged
By Ross Kelly Published