AI Strategy, Cybersecurity, Compliance Automation & Microsoft 365 Managed IT for Security-First Financial Institutions | ABT Blog

Phishing-Resistant MFA for Financial Institutions: FIDO2, Passkeys, Hardware Keys

Written by Justin Kirsch | Thu, Apr 30, 2026

Your institution rolled out multi-factor authentication years ago. Every employee enrolled. Every privileged account is enforced. The board reports that MFA coverage is at 100 percent. And yet the threat intelligence briefing you sat through last quarter described attackers walking past MFA prompts at thousands of organizations, using a thirty-dollar phishing kit, with no malware involved.

That gap is the whole story. The MFA you deployed and the MFA examiners now want are not the same thing. The original promise of multi-factor was that something you have plus something you know would defeat password reuse and credential stuffing. It does. What it does not defeat is an attacker who relays your live login through a reverse proxy, watches you complete the SMS code or the Authenticator push, and then pockets the session cookie that proves you authenticated.

This article explains what phishing-resistant MFA actually is, why the FFIEC's 2021 authentication guidance now reads differently than it did three years ago, which Microsoft 365 authentication methods qualify, and how community banks, credit unions, and mortgage companies should sequence the rollout before their next IT examination.

10,000+
Adversary-in-the-middle phishing attempts Microsoft Threat Intelligence tracks against Microsoft 365 tenants every month. AiTM kits relay live sign-ins through reverse proxies, defeat SMS and push-based MFA at the session-cookie level, and require no malware to succeed.
Source: Microsoft Threat Intelligence; Proofpoint AiTM threat reporting, 2025

What "Phishing-Resistant" Authentication Actually Means

The term phishing-resistant is not marketing language. It is a technical category defined by NIST in Special Publication 800-63B, the federal standard most regulators including the FFIEC member agencies cross-reference when they evaluate authentication. The current revision, NIST SP 800-63-4, makes the boundary explicit.

NIST defines phishing resistance as the ability of an authentication protocol to prevent the disclosure of authentication secrets to an impostor verifier without relying on the vigilance of the user. That last clause matters. If your defense depends on the employee correctly identifying a fraudulent sign-in page, it is not phishing-resistant. The protocol itself has to fail closed when the verifier is wrong.

The NIST Boundary, In One Sentence

"Phishing resistance requires single- or multi-factor cryptographic authentication. Authenticators that involve the manual entry of an authenticator output (e.g., out-of-band and OTP authenticators) shall not be considered phishing-resistant because the manual entry does not bind the authenticator output to the specific session being authenticated."

NIST SP 800-63-4, Authentication and Authenticator Management

Two technical mechanisms qualify. The first is channel binding, where the authenticator and the verifier share a cryptographic context tied to the live transport, as with client-authenticated TLS using a PIV or smart card. The second is verifier name binding, where the authenticator only releases its credential to a verifier whose identity matches the one it was registered to. WebAuthn, the standard underneath FIDO2 security keys and passkeys, uses verifier name binding. The browser checks the origin. If a phishing page presents a different origin, the FIDO2 challenge does not complete.

NIST also distinguishes between Authenticator Assurance Levels. AAL2, the level most enterprise MFA targets, recommends but does not require phishing-resistant authentication. AAL3 requires it explicitly: the cryptographic authenticator must have a non-exportable private key and must provide phishing resistance. Privileged access in regulated financial institutions is increasingly being scoped at AAL3 by examiners and internal auditors.

Why SMS, Push, and One-Time Codes No Longer Pass the Bar

The reason every authentication form that involves manual entry fails the phishing-resistance test is the rise of adversary-in-the-middle phishing kits. Banks, credit unions, and mortgage companies have spent years explaining to staff that they will never receive an MFA push request they did not initiate. Attackers rebuilt the playbook so that the request is initiated by the user, on a real Microsoft sign-in page, against the real Microsoft authentication endpoint. The page in front of the user is just a reverse proxy.

The mechanics: a phishing email lures the user to a domain that looks like a Microsoft login. The page is hosted by an attacker but it transparently relays every keystroke and every challenge to login.microsoftonline.com in real time. The user enters credentials. Microsoft challenges for MFA. The user completes the SMS, the push, or the Authenticator code. Microsoft returns a valid session cookie. The proxy captures the cookie and replays it from the attacker's infrastructure. Within minutes, the attacker has full access to Exchange, SharePoint, OneDrive, and any federated SaaS application without needing the password again.

Traditional Phishing

Attacker harvests credentials, then attempts to authenticate. Microsoft MFA challenge fires. Attacker is blocked because the user does not approve the unfamiliar push. Net effect: MFA worked.

AiTM Phishing

Attacker proxies the user's live sign-in. User completes MFA on the real Microsoft page through the proxy. Session cookie is issued and stolen mid-flight. Net effect: MFA was completed, but the attacker holds the post-auth session.

The economics of this attack collapsed in 2024 and 2025. Phishing-as-a-service operators productized AiTM kits with subscription pricing, customer support, anti-bot controls, and pre-built templates for hundreds of tenants. Industry threat reporting indicates that Tycoon 2FA, the dominant kit, accounts for roughly three-quarters of phishing-as-a-service incidents and rents for as little as one hundred twenty dollars for a ten-day campaign. Proofpoint's 2025 reporting indicates AiTM incident volume rose forty-six percent year over year. Barracuda telemetry shows that since early 2025, sixty to seventy percent of all phishing campaigns now originate from PhaaS infrastructure.

Microsoft tracks more than 10,000 adversary-in-the-middle phishing attempts every month against Microsoft 365 tenants. The post-authentication session cookie is the target, not the password. Phishing-resistant authentication using FIDO2 security keys and passkeys bound to legitimate verifier domains is the strongest single control because the authenticator refuses to complete the challenge when the verifier origin does not match.

Microsoft Authenticator number matching, geographic context, and named-location restrictions make AiTM harder. They do not make it impossible. The proxy still relays the challenge, and the user still approves it on what looks like a normal sign-in. SMS-based MFA fails sooner, often without even reaching the proxy stage, because attackers can also intercept SMS through SIM-swap attacks, SS7 routing exploits, and cellular carrier social engineering. None of these defenses force the attacker to defeat the authenticator's cryptographic binding to the verifier, because there is no cryptographic binding.

What FFIEC Examiners and the FTC Safeguards Rule Now Expect

The MFA expectations for financial institutions in 2026 come from two distinct regulatory tracks, depending on the institution type. Banks and credit unions sit under the FFIEC interagency authentication guidance, examined by the OCC, FDIC, Federal Reserve, or NCUA. Independent mortgage lenders and servicers sit under the FTC Safeguards Rule (16 CFR Part 314), enforced by the FTC and reviewed under CFPB Compliance Management System examinations. Both tracks have moved toward phishing-resistant authentication for privileged access. They got there by different paths.

For banks and credit unions, the foundational document is the FFIEC's "Authentication and Access to Financial Institution Services and Systems," issued August 11, 2021 by the Federal Reserve, CFPB, FDIC, NCUA, OCC, and the State Liaison Committee. It replaced the 2005 internet-banking authentication guidance and the 2011 supplement. The key sentence from that document, repeated verbatim in OCC Bulletin 2021-36 and FDIC FIL-55-2021, is that multi-factor authentication or controls of equivalent strength can be used to effectively mitigate risks of unauthorized access.

That sentence has not changed. The threat environment it sits inside of has changed dramatically. Examiners are not pretending the 2021 guidance was written for AiTM kits, but they are reading the equivalent-strength language with current threat data in mind. A privileged account protected by SMS-based MFA in 2026 is not the same control posture it was in 2021. Whether SMS still qualifies as equivalent strength against the threats actually targeting your institution is the question every IT examination now reaches at some point.

The Examiner Read

Regulators have not codified phishing-resistant MFA as a hard requirement, and the 2021 FFIEC guidance does not name FIDO2 or passkeys. What is changing is interpretation. Examiners increasingly cite SMS-only MFA on privileged accounts as a finding rather than a recommendation. The shift is examiner-driven, supported by NIST's AAL3 phishing-resistance requirement and CISA's standing recommendation that critical infrastructure adopt phishing-resistant methods wherever possible.

Three regulatory dynamics are driving the shift. CISA, the federal agency responsible for cybersecurity guidance to critical infrastructure, has explicitly recommended phishing-resistant MFA for high-value targets since October 2022 and refreshed that guidance in 2024. NIST SP 800-63-4 codified the technical definition. And Microsoft, the platform vendor underneath most regulated tenants, has begun enforcing MFA on its own admin portals in two phases. The combined effect is that the floor for what counts as adequate authentication is rising, even though no new FFIEC guidance has formally raised it.

For credit unions, the NCUA's IT examination program has been particularly direct. NCUA examiners have been asking pointed questions about MFA coverage, the methods in use, and whether phishing-resistant alternatives are available for privileged access. The NCUA has not published an MFA mandate. They do not need to. The combination of the 2021 interagency guidance and current threat data is enough for an examiner to write up an institution running SMS-only MFA on its core banking administrator accounts.

Across federal banking regulators, the URSIT Support and Delivery component is where MFA findings concentrate. Federal examiner cybersecurity reports consistently identify MFA gaps for privileged access and remote access as the most common access-control finding category at community banks, credit unions, and savings associations. The NCUA's annual cybersecurity report cites the same pattern at credit unions. ABT's Conditional Access Policies for Financial Institutions overview covers the policy structure that pairs with phishing-resistant authentication strength to close that gap. The combination is what examiners want to see: identity-aware access policy plus authentication methods that survive AiTM.

For Mortgage Companies: The FTC Safeguards Rule Is More Explicit Than FFIEC

Independent mortgage lenders and servicers are not under FFIEC jurisdiction. The applicable rule is the FTC Safeguards Rule (16 CFR Part 314), updated in the 2023 amendment, which is more explicit about MFA than the FFIEC's "controls of equivalent strength" language ever was. The FTC Safeguards Rule states that financial institutions must implement multi-factor authentication for any individual accessing any information system, unless the institution's Qualified Individual has approved in writing the use of reasonably equivalent or more secure access controls. The FTC published this requirement as a rule, not as guidance.

For mortgage companies, the practical effect is that AiTM-survivable authentication on privileged access is closer to a hard requirement than an emerging examiner expectation. SMS-based MFA on a wire approver, a loan officer with access to consumer financial information, or an IT administrator with access to borrower records is the kind of finding that the FTC's enforcement record under the 2023 Safeguards Rule amendment has begun to include. The institutions still using SMS-only MFA on privileged access are accumulating risk on two timelines: the operational risk of an AiTM compromise, and the enforcement risk of an FTC examination or a Fannie Mae, Freddie Mac, or Ginnie Mae seller-servicer counterparty audit that catches the gap.

The technical answer is the same for banks, credit unions, and mortgage companies. The Microsoft 365 phishing-resistant authentication strength accepts FIDO2 security keys, Windows Hello for Business, Microsoft Entra certificate-based authentication, and device-bound passkeys. The legal authority on the audit finding differs by institution type. The Microsoft 365 configuration that satisfies them does not.

The Phishing-Resistant Methods Microsoft 365 Supports

Microsoft Entra ID, the identity service underneath every Microsoft 365 tenant, ships with three built-in Conditional Access authentication strengths: Multifactor authentication strength, Passwordless MFA strength, and Phishing-resistant MFA strength. The strengths are predefined by Microsoft and cannot be modified. They differ in which combinations of authenticators satisfy them.

The Phishing-resistant MFA strength is the narrowest of the three. It only accepts authentication methods that involve a cryptographic interaction between the authenticator and the sign-in surface. SMS, password, OTP, push notification, voice call, and Microsoft Authenticator phone sign-in do not satisfy it. The accepted combinations are below.

Authentication Method MFA Strength Passwordless MFA Strength Phishing-Resistant MFA Strength
FIDO2 security key Yes Yes Yes
Windows Hello for Business or platform credential Yes Yes Yes
Microsoft Entra certificate-based authentication (multifactor) Yes Yes Yes
Passkey in Microsoft Authenticator (device-bound) Yes Yes Yes (when registered as device-bound)
Microsoft Authenticator (phone sign-in / push) Yes Yes No
Temporary Access Pass Yes No No
Password plus SMS, voice, push, or OTP Yes No No
SMS sign-in (no password) No No No
Password (alone) No No No

Source: Microsoft Learn, Overview of Conditional Access Authentication Strengths, 2026 (Microsoft Entra ID P1 license required)

The three methods that satisfy phishing-resistant strength are FIDO2 security keys, Windows Hello for Business, and Microsoft Entra certificate-based authentication. Each has a different deployment profile. FIDO2 security keys, sold by YubiKey, Feitian, and a handful of other vendors, are physical USB or NFC devices that sign WebAuthn challenges. They are the easiest method for institutions that want phishing-resistant MFA without rebuilding endpoint infrastructure. Windows Hello for Business uses TPM-backed cryptographic credentials on managed Windows endpoints, making it a fit for institutions that have already standardized on Intune-managed devices. Certificate-based authentication uses smart cards or X.509 certificates issued from an internal PKI, which is common at larger banks with existing PKI infrastructure but adds operational complexity for institutions starting from scratch.

Passkeys deserve a specific note. The passkey form most users encounter, where a credential syncs across iCloud or Google accounts, is convenient but is not what Microsoft Entra accepts as phishing-resistant. The version that does qualify is the device-bound passkey registered through Microsoft Authenticator, which behaves like a FIDO2 credential without the physical key. For mortgage companies and credit unions whose privileged users already have managed mobile devices, device-bound passkeys can be the fastest deployment path.

Microsoft's Mandatory MFA Timeline and What It Triggers

Microsoft began enforcing mandatory MFA for sign-ins to its own admin portals in late 2024. The enforcement is rolling out in two phases, with a postponement window for tenants that need additional preparation time. Whether or not your institution treats this as a regulatory event, it is a configuration event you cannot opt out of.

October 2024
Phase 1 begins. MFA enforcement starts for the Azure portal, Microsoft Entra admin center, and Microsoft Intune admin center. Any Create, Read, Update, or Delete operation against these portals requires MFA. Rollout is gradual across tenants.
February 2025
Microsoft 365 admin center added. Phase 1 enforcement extends to portal.office.com, admin.cloud.microsoft, and admin.microsoft.com. Global Admins, Exchange Admins, SharePoint Admins, and any role that touches the M365 admin center is in scope.
October 1, 2025
Phase 2 begins. Enforcement extends to Azure CLI, Azure PowerShell, the Azure mobile app, Infrastructure-as-Code tools, REST API endpoints, and the Azure SDK for any Create, Update, or Delete operation. Read operations remain unaffected.
July 1, 2026
Phase 2 postponement deadline. Tenants with complex environments or technical barriers can postpone Phase 2 enforcement until this date by request. After enforcement begins, only Microsoft Help and Support can temporarily lift it, and only at the request of a Global Administrator.

The most important operational consequence is for break-glass and emergency-access accounts. Microsoft's published guidance is explicit: break-glass accounts must use FIDO2 passkey or certificate-based authentication to satisfy the mandatory MFA requirement. The familiar pattern of holding a long, complex password in a sealed envelope for emergency access does not satisfy the requirement. Institutions that have not migrated their break-glass accounts to FIDO2 or certificates are running a configuration that will lock them out of administrative access if Phase 2 enforcement triggers and the primary admin's MFA factor is unavailable.

Service accounts running automation scripts against the Azure REST API or PowerShell are the second operational concern. User-based service accounts cannot complete an MFA challenge non-interactively. The Microsoft-published path is to migrate user-based automation accounts to workload identities, which use service principals or managed identities and are out of scope for the mandatory MFA enforcement. Institutions running vendor-supplied scripts that authenticate as a user account against Azure are on a hard deadline to either migrate to workload identities or postpone Phase 2.

Map your tenant's MFA posture before your next IT examination

The fastest way to know whether your privileged accounts already use phishing-resistant methods is a security grade scan against your live tenant. ABT runs the audit. You see what examiners will see.

Get Your Security Grade Talk to an Expert

Building a Phishing-Resistant Authentication Program at Your Institution

The mistake most institutions make at the start of a phishing-resistant MFA rollout is treating it as a tenant-wide flip. It is not. Forcing every employee to register a FIDO2 key on the same day creates a help-desk avalanche, breaks legacy applications that do not support modern authentication, and burns political capital that the program needs for the harder phases. The institutions that actually finish the rollout treat it as a four-stage sequence.

1
Identify Privileged and High-Value Accounts

Pull the list of Global Admins, Exchange Admins, SharePoint Admins, security operators, finance executives, wire-transfer approvers, core-banking admins, and any account with delegated permissions on customer-facing systems. This is the population that goes first. For most community institutions, it is between two and five percent of all accounts but represents the entire blast-radius surface.

2
Pilot FIDO2 or Device-Bound Passkeys

Run a six-week pilot with the privileged-account population. Issue FIDO2 keys to admins; enroll managed mobile devices with device-bound passkeys for executives. Capture help-desk tickets, registration friction, and edge cases. The pilot is the institutional learning event that prevents the broader rollout from stalling.

3
Apply Phishing-Resistant Authentication Strength via Conditional Access

Build a Conditional Access policy that requires the built-in Phishing-resistant MFA strength for sign-ins to administrative portals, the M365 admin center, and high-risk applications. Scope the policy to the privileged-account group. Run it in report-only mode for at least two weeks before enforcement to surface any access path that depends on a non-phishing-resistant factor.

4
Phase Out SMS for All Remaining Accounts

Once privileged accounts are stable on phishing-resistant methods, retire SMS as an authentication option for the remainder of the user base. Keep voice as a registration recovery method only. The end state is that no production sign-in flow at your institution accepts a manually entered authenticator output for high-risk transactions.

The sequence matters because it lets the rollout produce examination-grade evidence early. By the end of Stage 2, the institution can demonstrate to its IT auditor or NCUA examiner that privileged access is on phishing-resistant MFA. By the end of Stage 3, it can show a Conditional Access policy artifact that enforces the strength. Stage 4 takes the longest because it requires application-by-application compatibility testing for the long tail of legacy or third-party tools that may not support FIDO2 or certificate-based authentication. Some of those tools require vendor escalation. None of them are reasons to delay Stages 1 through 3.

The institutions ABT works with most often start at Stage 1 and finish through Stage 3 in a single quarter when their privileged-account population is small and their device fleet is already Intune-managed. Stage 4 typically runs across two or three quarters. The relevant question is not how long the full rollout takes; it is whether your privileged accounts are protected before your next examination cycle.

For credit unions, banks, and mortgage companies that already use Conditional Access for risk-based access decisions, the integration is straightforward: the Phishing-resistant MFA strength becomes one of the grant controls in the existing policy structure. ABT's 5 Conditional Access Rules Every Financial Institution Needs covers the policy patterns that pair with authentication-strength enforcement. For institutions that have not yet operationalized Conditional Access, the rollout doubles as the entry point to identity-aware access decisions, which is itself an examiner expectation. The shift to phishing-resistant authentication is part of a broader pivot articulated in The Moat Is Gone: Why Identity Is Your New Security Perimeter in Microsoft 365: identity is the control plane now, and authentication strength is its first gate.

The work also feeds directly into the broader cybersecurity framework conversation examiners are having about NIST CSF 2.0. Phishing-resistant MFA on privileged access maps to the Protect function category PR.AA, Identity Management and Access Control. ABT's NIST CSF 2.0 Assessment for Financial Institutions evaluates that mapping alongside the Govern, Identify, Detect, Respond, and Recover function gaps that make up the rest of the modern examination conversation.

Build the rollout against ABT's Microsoft 365 operating model

ABT runs identity-aware access management for more than 750 banks, credit unions, and mortgage companies on Microsoft 365. The phishing-resistant rollout is one of the standard programs in the Guardian operating model. Talk to an expert to scope your institution's path.

Talk to an Expert Get Your Security Grade

Frequently Asked Questions

Multi-factor authentication requires a user to present two or more authentication factors before being granted access. Phishing-resistant MFA is a subcategory defined by NIST SP 800-63-4 that requires the authentication protocol itself to prevent disclosure of authentication secrets to an impostor verifier, without relying on the user's vigilance. NIST excludes SMS, voice, push notification, and one-time-passcode authenticators from the phishing-resistant category because manual entry of an authenticator output does not bind the authenticator to the specific session being authenticated. Phishing-resistant methods include FIDO2 security keys, Windows Hello for Business, certificate-based authentication, and device-bound passkeys.

The 2021 FFIEC interagency Authentication and Access guidance does not name phishing-resistant MFA, FIDO2, or passkeys explicitly. It requires multi-factor authentication or controls of equivalent strength to mitigate unauthorized access risk. As of April 2026, no successor FFIEC guidance has been issued. What has changed is interpretation. FFIEC member agency examiners, including the OCC, NCUA, and FDIC, increasingly cite SMS-only MFA on privileged accounts as a finding rather than a recommendation. The shift is examiner-driven and reflects the rise of adversary-in-the-middle phishing kits. Institutions should treat phishing-resistant MFA on privileged access as the emerging examiner expectation, supported by NIST SP 800-63-4's AAL3 phishing-resistance requirement and CISA's standing recommendation that critical infrastructure adopt phishing-resistant methods.

Microsoft Entra ID's built-in Phishing-resistant MFA authentication strength accepts three method families: FIDO2 security keys, Windows Hello for Business or platform credential, and Microsoft Entra certificate-based authentication (multifactor). Device-bound passkeys registered through Microsoft Authenticator also qualify. Methods that do not satisfy the phishing-resistant strength include SMS sign-in, password plus SMS, password plus voice, password plus OTP, password plus push notification, password plus software OATH token, password plus hardware OATH token, Microsoft Authenticator phone sign-in, Temporary Access Pass, and password alone. The Phishing-resistant MFA strength requires a Microsoft Entra ID P1 license.

Microsoft began enforcing mandatory MFA in two phases. Phase 1 started in October 2024 for the Azure portal, Microsoft Entra admin center, and Microsoft Intune admin center, requiring MFA for any Create, Read, Update, or Delete operation. Phase 1 extended to the Microsoft 365 admin center starting February 2025. Phase 2 began October 1, 2025, extending enforcement to Azure CLI, Azure PowerShell, the Azure mobile app, Infrastructure-as-Code tools, and Azure REST API endpoints for Create, Update, and Delete operations. Tenants with complex environments can postpone Phase 2 until July 1, 2026 by request. There is no opt-out available for either phase. Microsoft recommends break-glass and emergency-access accounts use FIDO2 passkey or certificate-based authentication to satisfy the requirement.

FIDO2 security keys use the WebAuthn standard, which implements verifier name binding. When a user registers a FIDO2 key with a service, the key cryptographically associates its credential with that service's origin (for example, login.microsoftonline.com). During subsequent sign-ins, the browser passes the actual origin of the page the user is on to the FIDO2 key as part of the authentication challenge. If the page is a phishing proxy hosted at a different origin, the FIDO2 key refuses to complete the challenge. The cryptographic binding fails closed. The user does not need to recognize the phishing page; the protocol detects the mismatch and aborts. This is the technical mechanism that makes FIDO2 phishing-resistant in the NIST SP 800-63-4 sense, while SMS, push, and OTP methods all complete the challenge regardless of which origin the user is actually on.

The first step is to inventory privileged accounts: Global Admins, Exchange Admins, SharePoint Admins, security operators, finance executives, wire-transfer approvers, and core-banking administrators. This population is typically two to five percent of all accounts but represents the highest-impact authentication surface. Next, run a six-week pilot enrolling those accounts in FIDO2 security keys or device-bound passkeys through Microsoft Authenticator. Once the pilot is stable, build a Conditional Access policy that requires the built-in Phishing-resistant MFA authentication strength for sign-ins to admin portals and high-risk applications, and run it in report-only mode for at least two weeks before enforcement. Phasing out SMS for the broader user base is the final stage and typically runs across two or three quarters because it requires application compatibility testing. The privileged-account stage produces examination-grade evidence in a single quarter and is the highest-priority work.

Justin Kirsch

CEO, Access Business Technologies

Justin Kirsch has been building Microsoft cloud infrastructure for credit unions, banks, and mortgage companies since 1999. As CEO of Access Business Technologies, the largest Tier-1 Microsoft Cloud Solution Provider dedicated to financial services, he helps more than 750 regulated institutions move from SMS-based MFA toward phishing-resistant authentication models that survive adversary-in-the-middle attacks and align with NIST SP 800-63-4, FFIEC examiner expectations, and the URSIT Support and Delivery component.