January 2, 2026
One-Time Passcodes (OTPs) have been a cornerstone of online security for over two decades. If you’ve ever received a six-digit code by text message to log into your bank, you’ve used one. But as cyberattacks grow more sophisticated, the question organizations and security teams are asking has changed from “should we use OTPs?” to “are OTPs still safe enough?”
This article explains what OTP authentication is, how the different types work, the specific security risks each carries, and why biometric face verification is increasingly replacing OTPs as the authentication method of choice for high-assurance use cases.
What is OTP? Meaning and Definition
An OTP is a computer-generated code that is valid for a single authentication session and expires after a short window – typically 30 to 120 seconds, or immediately after use.
Unlike a static password, which remains the same until a user changes it, an OTP is unique each time. This eliminates the risk of credential replay attacks, where an attacker reuses an intercepted password. OTPs are delivered via SMS text message, email, an authenticator app, or a hardware token device.
OTP authentication is commonly used as a component of multi-factor authentication (MFA), satisfying the possession factor – the ‘what you have’ layer of assurance. The assumption is that only the legitimate user has access to the device or inbox receiving the code.
How Does OTP Work?
The basic OTP process follows three steps:
- The user attempts to log in or complete a transaction.
- The system generates a unique, time-limited code and delivers it to the user’s registered device or email address.
- The user enters the code to authenticate. The session is granted if the code matches and has not expired.
OTPs are generated using one of two underlying algorithms:
- HOTP (HMAC-Based One-Time Password): the code is generated based on a counter that increments with each authentication event. The code remains valid until it is used, rather than expiring by time.
- TOTP (Time-Based One-Time Password):Â the code is generated based on the current time and expires after a fixed interval, typically 30 seconds. Authenticator apps like Google Authenticator use TOTP.
In the case of SMS OTP, neither algorithm is used — the code is simply generated server-side and transmitted over the mobile network, with no cryptographic binding to the user’s device.
The Main Types of OTP Authentication
- SMS OTP: Â a one-time code sent to your mobile number via text message. The most widely used format, but the most vulnerable.
- Email OTP:Â a code delivered to your registered email inbox. Convenient, but dependent on the security of the email account.
- TOTP (Time-Based, App-Generated): a rolling code generated by an authenticator app (Google Authenticator, Microsoft Authenticator, Authy). More secure than SMS because it is not transmitted over the phone network. Typically valid for 30 seconds.
- HOTP (Counter-Based): Â a code that increments with each use rather than expiring by time. Used in some hardware token implementations.
- Hardware tokens:Â a dedicated physical device (not a smartphone) that displays a one-time code. Common in enterprise and financial services environments.
OTP Authentication: What’s The Issue?
Mela Abesamis had always considered herself careful when it came to cybersecurity. She was well aware of phishing attacks and other common fraud tactics, and how to spot them. She was also used to receiving One-Time Passcodes (OTPs) from her bank, sent by SMS to her mobile device to authenticate her identity.
But then in December 2021, Mela received a message from her bank, saying that 50,025 Philippine pesos (around $950) had been moved from her account to a Mark Nagoyo. This was the first and only indication she received that money had been transferred. She had never heard of Mark Nagoyo, she certainly hadn’t made the payment, and she had not received a one-time passcode during the transaction.
She wasn’t alone. Over 700 account holders were affected by the fraud. In Filipino, the word “nagoyo” means to make a fool out of someone.
Five individuals were eventually indicted for the scam. The fraudsters used phishing techniques to harvest bank login credentials. They were then able to bypass the bank’s OTP security controls entirely – victims reported that transactions were processed without any OTP being triggered – and drain people’s bank accounts.
The bank repaid the affected amounts, but this didn’t fully offset the traumatic experience for the victims.
This is just one example of how compromising OTP authentication is becoming less and less of a challenge for increasingly sophisticated attackers. This article examines exactly how those attacks work — and what more secure alternatives look like.
Are OTPs Safe?
OTPs are more secure than static passwords alone. Because each code is unique and expires quickly, intercepting one does not give an attacker reusable credentials.
However, OTPs have a fundamental structural limitation: they only satisfy the possession factor of authentication – “what you have.” Whatever device or inbox receives the code can be compromised. A stolen phone, a hijacked phone number, or a phished code all defeat OTP authentication entirely, without the attacker needing to break any cryptography.
The consensus among security researchers and regulators has shifted. NIST’s Digital Identity Guidelines (SP 800-63B) now explicitly restrict the use of SMS OTP for high-assurance authentication due to its susceptibility to interception. The UK’s National Cyber Security Centre similarly advises organizations to move away from SMS-based second factors where alternatives are available.
So: OTPs are better than passwords alone, but they are not safe enough for high-assurance use cases — and the attack techniques targeting them are becoming easier to execute at scale.
Can OTP Be Hacked?
Yes – and there are several well-documented methods attackers use to intercept or bypass OTP authentication without needing physical access to the target’s device.
SIM Swap Attacks
The most prevalent SMS OTP attack. The fraudster harvests personal details about the target — through phishing, data breaches, or social engineering — and uses them to convince the victim’s mobile carrier to transfer the phone number to a SIM card under the attacker’s control. All subsequent SMS messages, including OTPs, are then delivered to the attacker.
SIM swap fraud is accelerating sharply. UK fraud watchdog Cifas recorded a 1,055% surge in unauthorized SIM swaps in 2024, rising from 289 cases in 2023 to nearly 3,000. In the US, the FBI’s Internet Crime Complaint Center recorded $26 million in reported SIM swap losses in 2024, and a single case resulted in a $33 million arbitration award against T-Mobile after a swap enabled a cryptocurrency theft.
The SS7 Protocol Flaw
SS7 (Signaling System No. 7) is the decades-old protocol that primarily underpins 2G and 3G mobile networks, including SMS routing. It contains a design flaw that allows attackers with access to the SS7 network, typically sophisticated criminal groups or state actors, to intercept calls and text messages in transit, including OTPs.
In Germany, fraudsters exploited the SS7 protocol via a foreign network operator to intercept SMS OTPs sent to O2 Telefonica customers at scale, enabling them to drain bank accounts belonging to an undisclosed number of customers.
Real-Time Phishing and OTP Interception
A growing and particularly dangerous attack class. Adversary-in-the-middle toolkits — including widely available frameworks like Evilginx — allow attackers to create convincing proxy versions of legitimate login pages. When a target enters their credentials and OTP, the attacker’s server captures both in real time and replays them to the genuine site before the OTP expires. The attacker gains full session access despite the victim having correctly completed MFA.
This attack requires no SIM access, no SS7 exploit, and no malware – just a convincing phishing page and an automated relay. It defeats SMS OTP, email OTP, and TOTP equally.
TOTP-Specific Risks
App-based TOTP is more resistant to interception than SMS, but still has exploitable weaknesses:
- Device theft or compromise. If an attacker gains access to a device containing an authenticator app — and that same device is used to complete the transaction — the “two factors” collapse into one. The MFA classification becomes questionable.
- Backup code exposure. Most authenticator apps generate recovery codes during setup. If those codes are stored insecurely (in a notes app, email, or cloud backup), they become a single point of failure.
- Social engineering. Attackers increasingly call targets in real time, impersonating bank fraud teams, and pressure them into reading out their TOTP code during an “account verification” call.
What Are The Security Risks Of OTP Authentication?
The fundamental issue with OTP authentication is that it only meets the possession factor of authentication. What you have — be it your cellphone or hardware token — can be lost, stolen, compromised, or impersonated at the carrier level. Below is a summary of the main risk vectors by OTP type.
SMS OTP Security Risks
As shown in the Philippines case, attackers don’t need to steal your phone to defeat SMS OTP. Text messages are unencrypted and tied to a phone number rather than a specific device. The main attack vectors are SIM swapping, SS7 exploitation, and real-time phishing – all covered in detail above.
TOTP Security Risks
TOTP and app-based authentication offer more security than SMS, as the code is generated locally and not transmitted over a carrier network. But as noted, device compromise, real-time phishing, and social engineering all remain viable attack paths. TOTP also still only satisfies the possession factor – raising questions about whether it genuinely constitutes multi-factor authentication when both the transaction and the authentication happen on the same device.
Does OTP Authentication Offer An Outdated User Experience?
The pandemic accelerated demand for seamless, remote-first user experiences. OTP authentication lags behind on several dimensions.
Active Process
OTP authentication requires action from the user: retrieving a device, opening an app, or switching between screens. TOTP’s 30-second expiry window means users who don’t move quickly enough face authentication failures, adding friction and sometimes causing abandonment entirely.
A Lack of Inclusivity
OTP authentication assumes users have a mobile device, a working phone number, and the ability to follow multi-step instructions across different screens. Not everyone does. For users with certain disabilities, older demographics, or those without consistent mobile access, OTP-based security creates genuine exclusion barriers. Biometric verification also requires a device but eliminates the need for a working phone number and reduces cognitive steps to a single, passive action, aligning with WCAG 2.2 AA.
OTP vs Biometric Authentication: A Comparison
Whereas OTP authentication satisfies the possession factor (“what you have”), biometric authentication satisfies the inherence factor — “what you are.” Your face cannot be lost, stolen, or ported to another number.
OTP Authentication
Authentication factor: Possession — “what you have” (a device or inbox).
Can be stolen or intercepted? Yes — SMS OTP via SIM swap, SS7 exploit, or phishing relay. TOTP via device theft or social engineering.
Phishing resistant? No — real-time adversary-in-the-middle toolkits defeat both SMS OTP and TOTP.
User experience: Active — requires switching between screens or apps, with time pressure on TOTP codes.
Verifies genuine presence? No — confirms possession of a device, not the identity of the person holding it.
NIST SP 800-63B: SMS OTP restricted for high-assurance use. TOTP meets AAL2 only.
Biometric Face Verification (iProov)
Authentication factor: Inherence — “what you are” (your face).
Can be stolen or intercepted? No — a face cannot be ported to another device or intercepted in transit.
Phishing resistant? Yes — liveness detection defeats spoofed photos, videos, and AI-generated deepfakes.
User experience: Passive — a brief face scan with no instructions, no time pressure, and no screen switching.
Verifies genuine presence? Yes — confirms the right person, a real person, authenticating right now.
NIST SP 800-63B: Meets AAL2/AAL3 biometric verification requirements with liveness detection
Why Is Biometric Verification A Better Alternative To OTP Authentication?
While a one-time passcode can be intercepted, ported, or socially engineered, nobody can steal your face. Biometric authentication can offer a more secure method for organizations to verify users against a government-issued ID during onboarding and enrollment, and to re-verify returning users at high-risk moments such as payment authorization or account changes.
- It can also be used for truly secure account recovery, which is an increasingly vulnerable process that other authentication methods fail to address.
- iProov face authentication is out of band — a type of authentication that uses a completely separate communication channel. iProov technology assumes the device has been compromised and processes the authentication securely in the cloud. Even if a bad actor has full access to someone’s device, the authentication process remains secure.
How Does Liveness Detection Compare To OTP Authentication?
Basic biometric systems can be spoofed, too – attackers can present a mask, a printed photo, or a video of the victim to fool a basic facial recognition system. This is where strong liveness detection becomes the differentiator.
Liveness detection uses biometric technology to verify that the person authenticating is a real, live human being – not a photo, video, mask, or AI-generated deepfake. OTP authentication cannot deliver this level of assurance. Mark Nagoyo was not a real person, but the fraudsters were still able to execute hundreds of unauthorized transactions using stolen credentials.
Learn how iProov liveness detection sets the standard for security and outpaces other solutions.
How is Biometric Face Verification Different From OTP Authentication?
Liveness detection uses facial verification to ensure that it’s the right person and a real person: two layers of security that OTP authentication cannot achieve.
However, liveness detection alone can’t verify whether a person is authenticating right now. iProov’s science-based biometric solutions can. They do this with iProov’s Flashmarkâ„¢ technology, which illuminates the remote user’s face with a unique, randomized sequence of colors that cannot be replayed or manipulated synthetically, preventing spoofing.
Unlike SMS OTP authentication — which uses vulnerable phone networks to deliver passcodes — iProov is a cloud-based technology, meaning its defenses are hidden from attackers, making interception fundamentally harder.
As discussed, OTP authentication requires users to actively retrieve and enter a code. iProov’s Genuine Presence Assurance is entirely passive. Using any device with a front-facing camera, users simply look at the camera and authentication completes — with no instructions to read, no codes to copy, and no time pressure. You can read more about the evolving threat landscape OTPs face in iProov’s 2025 Threat Intelligence Report.
If you want to make your online authentication more secure and effortless and want to benefit from biometric authentication, request a demo here.
OTP Authentication: Frequently Asked Questions
- What does OTP mean?
- OTP stands for One-Time Passcode (or One-Time Password). It is a unique, short-lived code generated for a single authentication session. Unlike a static password, an OTP expires after use or after a short time window, making it harder for attackers to reuse intercepted credentials.
- What is OTP authentication?
- OTP authentication is a method of verifying a user’s identity using a temporary, single-use code. It is commonly used as a second factor in MFA, alongside a password. The OTP is delivered via SMS, email, or an authenticator app and must be entered within a short expiry window to complete the authentication.
- What is SMS OTP?
- SMS OTP is a one-time passcode delivered to a user’s mobile phone number via text message. It is the most widely used form of OTP, but also the most vulnerable – susceptible to SIM swap attacks, SS7 protocol exploits, and real-time phishing. NIST’s Digital Identity Guidelines now restrict SMS OTP for high-assurance authentication.
- Is OTP safe?
- OTPs are more secure than static passwords alone, but they have significant vulnerabilities – particularly SMS-based OTPs, which can be intercepted via SIM swapping or SS7 attacks without the attacker needing physical access to the victim’s device. App-based TOTP is more resistant to interception but still vulnerable to real-time phishing relay attacks. For high-assurance use cases, most security frameworks now recommend moving beyond OTP to phishing-resistant methods such as passkeys or biometric verification.
- Can OTP be hacked?
- Yes. The most common methods are SIM swap attacks (convincing a carrier to port a phone number to an attacker-controlled SIM), SS7 exploitation (intercepting SMS messages at the network level), and real-time adversary-in-the-middle phishing (relaying OTPs through a proxy login page before they expire). These attacks do not require access to the victim’s device and are increasingly accessible to non-technical criminals.
- Can OTP be intercepted?
- SMS OTPs can be intercepted via SIM swapping, SS7 protocol vulnerabilities, or real-time phishing toolkits. App-based TOTPs are not transmitted over a carrier network and are therefore more resistant to interception, but they remain vulnerable to device compromise and social engineering. Email OTPs rely entirely on the security of the email account.
- What is the difference between OTP and biometric authentication?
- OTP authentication satisfies the “what you have” factor — it depends on access to a device or inbox that can be lost, stolen, or compromised. Biometric authentication satisfies the “what you are” factor — it uses an inherent physical characteristic, such as a face, that cannot be ported or transferred. When combined with liveness detection, biometric authentication also confirms that the person is physically present and authenticating in real time, which OTPs cannot.



