MFA (Multi-Factor Authentication)

MFA (Multi-Factor Authentication) is an access control method for digital systems (e.g., Google Ads dashboard, corporate email, CMS) that requires the user to provide at least two different forms of identity verification before granting access.

The classic MFA model relies on a combination of at least two of the three following pillars:

  1. Something you know (Knowledge): A password or PIN.
  2. Something you have (Possession): A smartphone receiving an SMS, an Authenticator app, or a physical hardware key.
  3. Something you are (Biometrics): A fingerprint (TouchID) or facial scan (FaceID).

While MFA (often in the form of 2FA – Two-Factor Authentication) was considered the gold standard of security until recently, it has proven insufficient in the face of modern cyberattacks targeting marketing departments.

Why does traditional MFA provide a false sense of security?

For a Marketing Manager, it is crucial to understand that hackers in 2026 no longer crack passwords or guess MFA codes. They simply bypass them. Traditional methods (SMS, authenticator apps) collapse under the weight of two types of attacks:

  • Session Hijacking (Cookie Theft): As explained in the Infostealer definition, malware steals the session cookie from the browser. This cookie serves as an electronic proof to Google that the user has already passed the MFA process. By injecting it into their own browser, the hacker enters the account without entering any codes. It’s like stealing a stamped festival pass—no one asks for your ID at the gate.
  • AiTM Attacks (Adversary-in-the-Middle): The user clicks a phishing link (e.g., a fake Google Ads alert email). The site looks identical to the Google login page. The user types their password and manually enters the code from their Authenticator app. The proxy site forwards this code to the real Google server in a fraction of a second and immediately steals the newly opened session.

The New Security Standard for Agencies: Hardware Keys (U2F/FIDO2)

Simple codes that can be “typed in” or intercepted no longer protect advertising budgets (the MCC account threat).

The response of the market and tech giants to account takeovers is the shift to hardware security keys (e.g., YubiKey) operating on the FIDO2/WebAuthn standard. Instead of typing a code from a phone, the employee must insert a small key into the computer’s USB port and touch it.

  • Why does this work? The hardware key cryptographically verifies if the site you are logging into is the real google.com and not a fake phishing site like g00gle.com. If the domain doesn’t match, the key refuses to authenticate. It is completely immune to AiTM attacks.

FAQ

What is the difference between 2FA and MFA?

2FA (Two-Factor Authentication) is a subset of MFA. 2FA requires exactly two factors (e.g., password + SMS). MFA is a broader term that can require two, three, or more factors (e.g., password + app token + fingerprint in a banking app).

Are SMS codes secure?

Absolutely not. SMS codes are the weakest and most outdated form of verification. They are vulnerable to SIM Swapping (a scammer tricking the telecom carrier into issuing a duplicate SIM card) and simple message interception by malicious phone apps. The NIST (National Institute of Standards and Technology) advises against using SMS for secure logins.

How can I ensure my marketing agency protects my ad account?

Ask them about their access policy. Reputable digital agencies (Google Partners) require their specialists to use exclusively physical U2F keys to log into corporate MCC accounts and prohibit saving passwords in browsers, replacing them with encrypted Password Managers.

Get a free quote

Delante - Best technical SEO agency