There are several ways to implement 2FA: SMS 2FA, Authenticator App, Push-based 2FA and Security Keys. If the service you use to send SMS to users is compromised, your users are also at risk.
Table of contents
How attackers can bypass 2FASMS 2FAAuthenticator AppHow attackers can bypass 2FA — sms and appsSort: