Phishing-Resistant MFA: What FIDO2 and Passkeys Actually Stop
Standard MFA stopped working against modern phishing sometime around 2022. Adversary-in-the-middle proxy phishing, MFA push fatigue, OAuth consent grant abuse and SIM swap have collectively reduced the defensive value of TOTP authenticators, SMS codes and push approval prompts. The replacement - phishing-resistant MFA - is a different category of credential entirely. FIDO2 hardware keys and platform passkeys defeat the modern attack patterns cryptographically. The question for IT and security teams in 2026 is not whether to deploy phishing-resistant MFA but how to sequence the rollout against the existing identity stack and which user populations to enforce first.
This post is for the IT director, the identity architect and the CISO who has been asked "is our MFA enough" and needs a defensible answer. It walks through what makes a credential phishing-resistant, what FIDO2 and passkeys actually stop, the deployment progression that does not break legitimate users and the residual attack surface that even phishing-resistant MFA does not cover.
What makes a credential phishing-resistant
The CISA-recognized phishing-resistant authentication factors are FIDO2/WebAuthn (hardware security keys and platform passkeys) and PKI smart cards. The cryptographic property that makes them phishing-resistant is origin binding: the credential ceremony cryptographically commits to the legitimate origin of the service, so a credential captured on a fake site cannot be replayed on the real one. The attacker's fake login page can collect the user's keystrokes all day; what they cannot collect is the cryptographic signature that the authenticator only produces when challenged by the genuine service.
Compare this to standard MFA. A TOTP authenticator code is a 6-digit number that the user types into whatever site asks for it - including a phishing page that proxies the code in real time to the legitimate service. SMS codes and push approvals work the same way. The credential is portable, which is exactly what makes them stealable. WebAuthn is intentionally non-portable; the authenticator and the legitimate origin are bound by the registration ceremony.
What FIDO2 and passkeys actually stop
- AiTM reverse-proxy phishing. Evilginx, Tycoon, EvilProxy and the rest cannot harvest a usable WebAuthn signature because the signature is bound to the attacker's proxy origin, not the legitimate service. The authentication ceremony fails on the attacker's side; the proxy collects nothing useful.
- MFA push fatigue. No push to approve. The user touches the security key or biometric, the authenticator commits to the origin, the ceremony either passes or fails on the device. There is no "approve" flow to social-engineer.
- SIM swap. Credentials are not bound to a phone number. SIM-swap attacks against bank accounts and personal email continue but do not give the attacker enterprise application access.
- Help-desk MFA reset social engineering. The reset flow re-issues a credential cryptographically bound to a new authenticator. Even if the help desk is fooled, the attacker has to physically possess the new authenticator at the reset moment.
- Session cookie theft from non-AiTM compromise. Conditional access policies that require continuous WebAuthn re-binding (token-binding, session-revocation on anomaly) catch replayed cookies. Less protected than the above but materially harder.
What phishing-resistant MFA does NOT stop
The hard limit on phishing-resistant MFA is that it only protects credential ceremonies. MFA-bypass phishing patterns that route around the credential ceremony entirely are unaffected.
- Business Email Compromise. The user authenticates legitimately with passkey, then is socially engineered into wiring funds. Authentication is correct; the action is wrong. WebAuthn doesn't have an opinion on wire transfers.
- Callback phishing (TOAD). The lure is a phone number, not a login URL. Authentication ceremony is never invoked. Once the call is connected, the attacker is operating outside the credential layer entirely.
- OAuth consent phishing. The user authenticates legitimately, then grants a malicious app the requested OAuth scopes. The consent flow is a separate ceremony from authentication; passkeys don't participate. The attacker now has API-level access without ever having stolen a credential.
- Compromised mailbox lateral movement. If a downstream user is compromised by some other vector and the attacker uses their inbox to send internal phishing, the recipient's passkey doesn't help on the sending side.
- Pre-auth attacks (e.g., zero-day in the IDP). A vulnerability in the identity provider itself that bypasses authentication entirely is uncommon but real. WebAuthn doesn't help.
The takeaway: phishing-resistant MFA is necessary but not sufficient. It addresses the largest single class of phishing-led breaches (credential theft -> account takeover) but leaves the residual attack surface to be addressed by security awareness training, behavior-triggered training and continuous phishing simulation.
Hardware keys vs platform passkeys: how to choose
Both use the WebAuthn protocol. Both are phishing-resistant. The differences are operational.
Hardware keys (YubiKey, Titan, Feitian) store credentials on a physical device. The user plugs in or taps the key to authenticate. Pros: portable across vendor ecosystems, no platform-vendor dependency, works on shared or BYO devices, FIPS-certified options for regulated industries. Cons: procurement and replacement-on-loss costs, user-experience friction (key insertion or NFC tap on every authentication), risk of total credential loss if all keys are lost.
Platform passkeys (Apple, Google, Windows Hello) store credentials in the device's secure enclave and synchronize via the platform vendor's cloud (iCloud Keychain, Google Password Manager). Pros: no procurement, biometric or PIN unlock that's already in user habit, automatic sync across the user's devices, vendor-managed recovery flows. Cons: vendor lock-in (passkey created on iPhone can't be used on Windows without bridging), recovery depends on the vendor's identity assurance, regulated industries may not approve cloud-synced credentials.
For most workforces, the practical default is platform passkeys for the general workforce + hardware keys for privileged-account holders (admins, executives, finance staff with wire-authority). The platform passkey rollout doesn't require procurement, and the hardware key tier provides the cross-platform portability and FIPS compliance that high-value accounts often need.
Deployment progression
The rollout that does not break legitimate users follows a 4-stage progression:
- Stage 1: passwordless optional. Enable WebAuthn at the IDP. Users can register passkeys voluntarily; password+MFA still works. Goal: identify infrastructure issues before they become user issues.
- Stage 2: passwordless preferred. Registered passkey users skip the password prompt. Visible UX win drives voluntary adoption. Goal: build organic adoption momentum without enforcement.
- Stage 3: passwordless required for sensitive apps. M365 admin portals, payroll, ERP, financial systems. Conditional access policy enforces phishing-resistant MFA for these specific applications. Goal: privileged-account coverage without forcing the entire workforce.
- Stage 4: passwordless required everywhere. Conditional access policy enforces phishing-resistant MFA for all sign-ins. Legacy fallbacks remain only for specifically-enumerated edge cases (legacy app, shared kiosk) with shorter session timeouts and continuous-evaluation triggers.
Each stage typically runs 1-3 months. The total timeline for a 1,000-5,000-user workforce is 6-12 months. Most organizations enforce phishing-resistant MFA on M365 admin, executive and finance accounts within 3 months and complete the general workforce rollout over 12 months.
Common deployment mistakes
- Skipping the inventory step. The legacy-app tail is where rollouts stall. Inventory all authentication-emitting apps in stage 0; do not discover them at stage 4.
- Neglecting break-glass accounts. At least two break-glass accounts with offline-stored hardware keys, monitored for any sign-in attempt. These are the disaster-recovery path if the IDP's phishing-resistant MFA layer fails.
- Forgetting BYO devices. Platform passkeys on personal devices have different policy implications than corporate devices. Conditional access should treat them differently or require corporate device for sensitive apps.
- Disabling phishing simulation after rollout. The residual attack surface (BEC, callback phishing, OAuth consent, vishing) is exactly what continuous simulation should now focus on. Pausing simulation gives attackers an unmonitored channel.
- Not coordinating with cyber insurance renewal. Carriers ask about phishing-resistant MFA coverage explicitly in 2026 questionnaires. Document the rollout milestones and coverage percentages; this is meaningful underwriting evidence.
How phishing-resistant MFA changes the simulation program
A continuous phishing simulation program after phishing-resistant MFA rollout should refocus on the patterns that route around the credential ceremony:
- BEC and wire-fraud lures targeting finance and executive staff. Authentication is irrelevant; the attack is on the action.
- Callback phishing (TOAD) with phone-number lures. The phone call replaces the login flow.
- OAuth consent phishing via fake productivity-suite app install requests. The consent ceremony is a different code path than authentication.
- Vishing including help-desk impersonation targeting MFA-reset workflows. Even with phishing-resistant MFA, the help desk can be fooled into re-issuing a credential to an attacker-controlled authenticator.
- SMS phishing (smishing) for users still on standard MFA during the transition window. The simulation has to remain in the program until rollout completes.
Programs that pause simulation entirely after phishing-resistant MFA deployment leave the residual attack surface untrained - and the residual surface is where 2026 attackers are concentrating. The right posture is not to stop simulating; it is to refocus on the attacks WebAuthn does not address.
What to ask your cyber-insurance carrier
Cyber-insurance renewal questionnaires in 2026 distinguish between "MFA enabled" and "phishing-resistant MFA enforced." The question you can expect: percentage of users with MFA, percentage with phishing-resistant MFA, and which user populations (admins, executives, finance, full workforce). Documented phishing-resistant MFA on privileged accounts is a meaningful underwriting credit alongside DMARC enforcement and continuous phishing simulation. After AiTM-driven incident-loss spikes in 2024-2025, carriers are weighting this question heavily in 2026 renewal cycles.
Pulling it together
Phishing-resistant MFA is the credential-layer answer to modern AiTM phishing. It is necessary but not sufficient: it addresses the largest single class of phishing-led breaches (credential theft -> account takeover) but leaves BEC, callback phishing, OAuth consent and vishing as residual attack surface. The right program design is phishing-resistant MFA enforced on privileged accounts within 3 months, full-workforce rollout within 12 months and continuous phishing simulation refocused on the patterns that route around the authentication ceremony.
If you want to test how your team holds up against the residual attack patterns - BEC, callback phishing, OAuth consent, vishing - start a free trial covering up to 25 users and run a hard-difficulty multi-channel campaign this week. For full deployment scoping including cyber-insurance evidence package design, see pricing or contact us.
Related reading
- MFA bypass phishing attacks - the 5 attack patterns FIDO2 defeats and the residual surface
- DMARC, DKIM, SPF email authentication - the email-layer companion defense
- Phishing as a Service - the commoditized AiTM platforms FIDO2 specifically defeats
- What cyber insurers ask about phishing training - the renewal questionnaire context

