The Industry Agrees: Traditional MFA Is Broken

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), the federal body responsible for setting cybersecurity standards across critical infrastructure and federal agencies, has been direct about it. In its Implementing Phishing-Resistant MFA guidance, CISA named FIDO2/WebAuthn and PKI as the gold standard for authentication, and explicitly warned that OTP, SMS, and push notifications are vulnerable to phishing, SIM swapping, SS7 exploitation, and prompt bombing.

That warning carries weight. CISA's guidance shapes procurement decisions across federal agencies, influences regulatory direction in financial services and healthcare, and sets the benchmark that enterprise security teams are increasingly measured against. When CISA calls a technology the gold standard, the rest of the market follows.

NIST's SP 800-63B reinforces the same direction. OMB M-22-09 mandates phishing-resistant MFA across federal agencies as part of zero trust architecture. Google now requires MFA for all Cloud users. Microsoft is pushing passkeys across its ecosystem.

The consensus is clear: authentication methods that produce transferable credentials, codes, tokens, approvals, are no longer considered secure against modern attacks. MFA fatigue attacks alone appeared in 14% of security incidents analysed in the 2025 Verizon Data Breach Investigations Report.

The question isn't whether organisations need phishing-resistant MFA. It's what "phishing-resistant" actually means in practice, and whether the solutions being promoted go far enough.

What Is Phishing-Resistant MFA?

Phishing-resistant MFA is authentication that cannot be defeated by phishing — even sophisticated real-time phishing attacks like adversary-in-the-middle (AiTM) proxies.

The technical requirement is cryptographic domain binding: the authenticator proves that the user is interacting with the legitimate service, not a lookalike. The private key never leaves the device. The authentication is bound to a specific origin. There is no shared secret, no code to intercept, and no approval to socially engineer.

Traditional MFA fails this test because every method produces something transferable. An OTP can be entered on a phishing page. A push notification can be approved under duress. A session token can be captured by a proxy. The attacker doesn't need to break the cryptography — they just need the user to hand over the output.

Phishing-resistant MFA eliminates this by design. The authentication proof is mathematically bound to the device and the destination. Even if a user clicks a phishing link, the authenticator refuses to respond to the wrong domain.

The Current Phishing-Resistant MFA Landscape

CISA's guidance names two categories of phishing-resistant MFA:

FIDO2/WebAuthn uses public-key cryptography with hardware-backed authenticators — security keys like YubiKeys, platform authenticators like Windows Hello or Apple Face ID, and passkeys synced across devices. The private key is generated and stored on the device. Authentication is bound to the legitimate origin. Nothing transferable is produced.

PKI-based authentication — primarily PIV and CAC cards used in government — uses certificate-based identity tied to smartcards. The same principle applies: cryptographic proof of identity that doesn't produce a replayable credential.

Both approaches represent a genuine step forward. They stop phishing, AiTM proxies, and credential replay attacks. CISA is right to push them.

But there are practical limitations that the guidance doesn't fully address.

Where FIDO2 and Passkeys Fall Short

FIDO2 security keys work. The cryptography is sound. But deployment at scale faces real friction.

Hardware distribution. Security keys cost $25–$60 per user. For an enterprise with 10,000 employees, that's a quarter million dollars in hardware before accounting for spares, replacements, and logistics. For consumer-facing services with millions of users, distributing dedicated hardware isn't feasible.

User adoption. Passkeys solve the distribution problem by using platform authenticators — the phone's biometric sensor or the laptop's fingerprint reader. But passkey adoption is still early. Users need to understand what passkeys are, how to set them up, and what happens when they lose a device. The education burden is real.

Legacy compatibility. FIDO2 requires modern browsers and operating systems. According to CISA and FIDO Alliance guidance, applications using legacy authentication protocols cannot directly support FIDO2 without architectural modifications. Full migration can span multiple years for complex IT environments.

Account recovery. This is the gap that rarely gets discussed. When a user loses their security key or their device, how do they recover their account? Most implementations fall back to email, SMS, or support-assisted recovery — reintroducing the exact phishing-vulnerable methods that phishing-resistant MFA was supposed to eliminate. Every fallback path is an attack path.

Consumer scale. FIDO2 was designed primarily for enterprise and government use cases. Securing a workforce of thousands is fundamentally different from securing a consumer base of millions — especially in markets where smartphone diversity, connectivity, and digital literacy vary dramatically.

These aren't arguments against FIDO2. They're arguments that FIDO2 alone doesn't complete the picture.

The Missing Layer: Network-Level Phishing Resistance

The conversation around phishing-resistant MFA has focused almost entirely on the application layer — what happens in the browser, on the device, between the user and the website.

But there's another layer of authentication infrastructure that's been overlooked: the mobile network.

Every phone is connected to its carrier through the SIM/eSIM — a tamper-resistant secure element that already performs cryptographic authentication millions of times per day. When a phone connects to a cell tower, the SIM and the network perform a mutual authentication using keys that never leave the hardware. This happens transparently, instantly, and at global scale.

This is hardware-rooted authentication that's already deployed on over 5 billion devices. It just hasn't been connected to application-layer identity.

Hardware-Rooted Authentication Through the SIM/eSIM and Mobile Network

SLC Digital bridges this gap. Instead of requiring users to buy security keys or set up passkeys, SLC authenticates through the SIM/eSIM and mobile network via a dedicated channel — delivering hardware-rooted, cryptographic proof of identity that's phishing-resistant by architecture.

The mechanics meet every criterion for phishing resistance:

Cryptographic binding. Authentication is signed by the SIM/eSIM's secure element using private keys that never leave the hardware. The proof of identity is generated in tamper-resistant silicon and transmitted through the mobile network — not through the internet, not through an app, and not through any channel the user or attacker can intercept.

No transferable credentials. There is no OTP, no push notification that can be approved under duress, and no session token floating through a browser. The authentication proof is consumed by the network at the point of generation. Nothing is produced that an attacker could capture, relay, or replay.

Two authentication modes to match the use case. SLC's approach supports both silent verification — which confirms identity in the background with no user action, ideal for continuous authentication and low-risk flows — and step-up authentication, which delivers a hardware-signed prompt to the device for high-impact actions where explicit consent is required. Even in step-up mode, the consent is bound cryptographically to the SIM/eSIM and the specific action, so the prompt itself cannot be relayed or phished.

A smaller recovery attack surface. Traditional MFA recovery falls back to email, SMS, or support-assisted flows — each one a phishing-vulnerable channel that attackers actively target. SLC's approach shifts recovery to a hardware rebinding process: retiring the existing binding and provisioning a fresh credential on the new device. This rebinding still requires identity verification, but the attack surface is fundamentally smaller because SMS and email aren't the trust anchors. The hardware is.

Scale through existing infrastructure. The tamper-resistant hardware is already in the user's pocket. Onboarding requires provisioning a Java Card applet onto the SIM/eSIM — a real step, but one that's handled through existing mobile network infrastructure rather than physical hardware distribution. For organisations weighing the logistics of shipping FIDO2 keys to millions of customers, or expecting every user to set up and manage passkeys, the math changes when the hardware is already deployed.

Phishing-Resistant MFA Examples: Comparing Approaches

For organisations evaluating phishing-resistant MFA solutions, the landscape now includes three viable architectures:

FIDO2 security keys deliver the strongest application-layer phishing resistance. Best suited for enterprise environments where hardware can be distributed and managed. Challenges include cost, logistics, and legacy application support.

Passkeys reduce the distribution burden by using platform authenticators. Best suited for consumer services with modern app infrastructure. Challenges include user adoption, device-dependent recovery, and ecosystem fragmentation.

SIM/eSIM and mobile network authentication delivers hardware-rooted phishing resistance at the network layer, with silent or step-up modes depending on the transaction. Best suited for financial services, mobile-first populations, and any environment where scale, deterministic identity, and a reduced recovery attack surface are priorities. The authentication runs through a dedicated channel independent of the application layer.

These aren't mutually exclusive. The strongest security posture combines multiple phishing-resistant methods across different layers. But for organisations that need phishing resistance at consumer scale — without the distribution challenges of security keys or the user-education burden of passkeys — SIM/eSIM-based authentication fills a gap that no other method currently addresses.

Where the Regulatory Direction Is Heading

CISA's current guidance focuses on FIDO2 and PKI. But the underlying principle — that authentication must be cryptographically bound to hardware and not produce transferable credentials — is technology-neutral.

Hardware-rooted authentication through the SIM/eSIM and mobile network satisfies this principle. The SIM/eSIM is a tamper-resistant, cryptographically capable secure element. The authentication is origin-bound through the dedicated channel. No shared secrets are transmitted. The approach aligns with the intent of NIST SP 800-63B, OMB M-22-09, and CISA's zero trust maturity model.

As regulatory frameworks mature beyond specifying particular technologies toward defining security properties, SIM/eSIM-based authentication will increasingly be recognised as a phishing-resistant method — one that's already deployed at a scale FIDO2 hasn't yet reached.

The Bottom Line

Phishing-resistant MFA is no longer optional. CISA, NIST, and every major platform vendor agree: authentication that produces transferable credentials is fundamentally insecure against modern attacks.

FIDO2 and passkeys are genuine advances. They solve the phishing problem at the application layer. But they introduce friction, cost, and recovery challenges that limit deployment at scale — especially for consumer-facing services and mobile-first markets.

Hardware-rooted authentication through the SIM/eSIM and mobile network solves the same problem at the network layer, using tamper-resistant hardware that's already in billions of pockets, through a dedicated channel that's already operational. Provisioning is required, but the distribution burden is solved by the existing mobile network. Recovery has a smaller attack surface because SMS and email aren't in the trust chain.

The goal of phishing-resistant MFA isn't to add another factor. It's to make phishing structurally impossible. The SIM/eSIM can do that — today, at scale, through infrastructure that's already deployed.

Evaluating phishing-resistant MFA for your organisation? See how SIM/eSIM-based authentication delivers phishing resistance at scale →