How to bypass PayPal two factor authentication

How to bypass PayPal two factor authentication
One of PayPal’s primary mechanisms to protect accounts from being hacked may have been fundamentally flawed for years.

That’s the concern raised by security researchers who uncovered a method of bypassing PayPal’s two-factor authentication (2FA), the technology that is supposed to protect your account should your username and password fall into the wrong hands.

As the video below demonstrates, when users log into a PayPal account which has 2FA enabled using one of the company’s smartphone apps they are briefly logged in *before* a message appears explaining that the feature is not compatible with mobile devices.

If you’re quick enough though, you can disable your device’s internet access (by enabling “Airplane mode”) temporarily. If you then re-enable net access you remain logged into the eBay account, having waltzed past PayPal’s two-factor authentication check.

Sign up to our free newsletter.
Security news, advice, and tips.

Duo Security, who publicised the flaw, claims that the “shoddy” vulnerability lies primarily in the authentication flow for the PayPal API web service — an API used by PayPal’s official mobile applications, as well as numerous third-party merchants and apps — and also partially in the official iOS and Android mobile apps themselves.

Duo’s blog post goes into much more detail, and shows that the problem was initially discovered by Dan Saltman of

Saltman informed PayPal’s security team about the bug back in March, but after receiving a lack of response turned to Duo – specialists in two-factor authentication – to see if they could confirm the security flaw and leverage any contacts they had inside PayPal.

There then followed a fair amount of back-and-forth between the companies, with Duo seemingly frustrated at slow response from PayPal, and PayPal requesting that Duo delayed its public disclosure of the flaw.

Views may differ as to whether Duo was right to go public about the flaw when it did, but now the news is out.

It appears to me that PayPal made it much too easy for fraudsters to trick PayPal into believing a user had not enabled two-factor authentication, even when they had.

And, the implication is that the flaw in PayPal’s systems may have been present since the firm launched its first mobile app way back in 2008.

Of course, the 2FA workaround can’t be put into play by hackers if they don’t know your PayPal password. That’s another reason why it’s so important to use a unique, hard-to-crack password for every website that you access, as well as being on your guard from phishing attacks and keylogging spyware.

PayPal, owned by online auction giant eBay, was reported by The Guardian as saying that “all PayPal accounts remain secure”, but that they have taken action to mitigate the issue:

As a precaution we have disabled the ability for customers who have selected 2FA to log in to their PayPal account on the PayPal mobile app and on certain other mobile apps until an identified fix can be implemented in the next few weeks.

eBay, of course, has had its own security headaches this year.

What do you think of this issue? Was Duo Security right to publicise the flaw? Has PayPal dropped the ball when it comes to implementing two-factor authentication? Leave a comment below sharing your thoughts.

This article originally appeared on the Lumension blog.

Found this article interesting? Follow Graham Cluley on Twitter, Mastodon, or Threads to read more of the exclusive content we post.

Graham Cluley is a veteran of the cybersecurity industry, having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows. Now an independent analyst, he regularly makes media appearances and is an international public speaker on the topic of cybersecurity, hackers, and online privacy. Follow him on Twitter, Mastodon, Threads, Bluesky, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.