From

Ideem

— device-bound passkeys and A2A payment authentication for banks, fintechs, and payment platforms.

From

Ideem

— device-bound passkeys and A2A payment authentication for banks, fintechs, and payment platforms.

Fraud
8 min read

The SMS OTP Exit Is Accelerating

The UAE mandated it. Regulators globally are signaling it. Telcos are moving away from it voluntarily. SMS OTP has become the weakest link in financial authentication — and the industry's pivot away from it is happening faster than most anticipated.
Written by
Maranda Manning
Published on
February 12, 2026

8 min read

TL;DR

SMS OTP is structurally vulnerable to SIM swap, SS7 interception, real-time phishing, and social engineering - attack patterns that are well-established and actively exploited against financial services customers. The UAE Central Bank has mandated OTP phase-out for digital banking; regulators across the Middle East, Asia, and Europe are moving in the same direction. Telcos - who profit from OTP message volume - are themselves beginning to move away from the channel, a telling signal about where the industry is headed. The transition from SMS OTP to passkey-based authentication is underway; the question for financial institutions is whether they lead it or are required to follow.

There's a particular moment in the lifecycle of a technology when the question stops being "should we replace this?" and starts being "how fast can we replace this?" SMS OTP has reached that moment in financial services.

The signals are everywhere. A major central bank mandated its elimination. Regulators across multiple continents are signaling the same direction. The fraud patterns that exploit OTP vulnerabilities have become sophisticated, scalable, and depressingly routine. And perhaps most telling of all: the carriers that profit from every OTP message sent are beginning to walk away from the revenue stream themselves.

The SMS OTP exit is accelerating. Financial services institutions that understand why - and act accordingly - will be ahead of a transition that is no longer a matter of if.

How SMS OTP Became the Standard

SMS OTP made sense when it was introduced. In the early days of digital banking, sending a one-time code to a customer's mobile phone was a genuine improvement over knowledge-based authentication alone. It introduced something the customer had - their phone - as a second factor. It was deployable without specialized hardware. It worked across every handset. It was cheap.

Those advantages were real, and they drove adoption across the financial services sector with a thoroughness that made SMS OTP the de facto standard for transaction authentication globally. By the time its vulnerabilities became well understood, it was deeply embedded in the infrastructure of digital banking everywhere.

The problem is that the security model SMS OTP depends on - that the phone number is a reliable proxy for the person - was always weaker than it appeared. And the attack industry spent years learning exactly how to exploit that weakness.

The Vulnerability Stack

SIM swap fraud is the most direct attack. By convincing a carrier's customer service operation - through social engineering, stolen identity documents, or insider access - to transfer a victim's number to an attacker-controlled SIM, fraudsters gain complete control of the OTP channel. From that point, they can authenticate as the victim for any account that relies on SMS OTP as a second factor. SIM swap attacks have been used to drain bank accounts, empty cryptocurrency wallets, and take over financial accounts across every major market.

SS7 protocol vulnerabilities represent a more technical but equally serious attack surface. The Signaling System 7 protocol, which underpins global mobile network interconnection, has known vulnerabilities that allow sophisticated attackers to intercept SMS messages in transit. SS7 attacks have been demonstrated against banking OTP systems in controlled research settings and have been attributed to real-world fraud incidents in multiple countries. The vulnerability is structural - it exists in the telecommunications infrastructure itself, not in any specific implementation - and there is no patch.

Real-time phishing kits have made OTP interception accessible to attackers without any telecommunications expertise. Modern phishing toolkits are designed specifically to defeat OTP: they present a convincing fraudulent interface to the victim, capture the OTP as it's entered, relay it to the actual banking application in real time, and complete the fraudulent transaction before the OTP expires. The technical barrier to this attack is now low enough that it's used routinely.

Social engineering remains the most scalable attack vector of all. Fraudsters posing as bank representatives, telecommunications company employees, or government officials call customers directly and talk them into reading out their OTP. This attack requires no technical sophistication whatsoever. It works because SMS OTP trains customers to expect an authentication code and to share it when asked.

The UAE Central Bank's Decision

When the UAE Central Bank mandated the phase-out of OTP-based authentication for digital banking, it made a regulatory statement that cut through the ambiguity that often surrounds authentication standards guidance. Rather than specifying technical frameworks and leaving institutions to interpret how OTP fit within them, the UAECB identified OTP as the problem and required financial institutions to replace it.

The directness of the mandate reflects the UAE's experience as a financial hub that has been on the receiving end of exactly the fraud patterns OTP enables. SIM swap fraud has been a significant source of account takeover losses in Gulf markets, and the UAECB drew the logical conclusion: if the attack surface is the authentication method, the authentication method needs to change.

The mandate's significance extends beyond the UAE. It establishes a regulatory precedent - a major central bank naming OTP specifically as inadequate - that other regulators in the region and beyond are watching. When a financial regulator of the UAECB's standing makes a call that direct, it influences the thinking of peer institutions.

The Broader Regulatory Signal

The UAE's explicit OTP mandate is the sharpest articulation of a direction that regulators globally are moving in, even if they're using softer language to get there. NIST SP 800-63-4's classification of synced passkeys as AAL2 effectively established that the US authentication standards framework has a path to strong security that doesn't run through OTP. The European Banking Authority's technical standards under PSD2 have driven the European banking sector toward SCA methods that are more robust than SMS OTP. ENISA's cybersecurity guidance has highlighted passkeys as a strong authentication approach. The Philippines' BSP Circular 1213 and Vietnam's SBV Decision 2345 have both pushed toward biometric, device-bound authentication.

None of these mandates say "ban SMS OTP" in the explicit terms the UAECB used. But they all establish authentication standards that OTP satisfies poorly, or not at all. The direction of travel is consistent across regulatory traditions and geographies: toward authentication that cannot be socially engineered, phished, or intercepted. SMS OTP cannot credibly claim to meet that description.

The Telco Signal

Perhaps the most striking indicator of where SMS OTP is headed is the behavior of the carriers themselves. Telecommunications companies have a direct financial interest in OTP message volume - every authentication message sent via SMS generates revenue for the carrier. That revenue has been substantial as mobile banking has scaled globally.

And yet major carriers have begun moving away from SMS OTP, both by advocating for its replacement and by developing their own authentication offerings that don't depend on the traditional OTP message format. When an industry is willing to walk away from a revenue stream, the signal about that revenue stream's future is clear. The carriers have concluded that the reputational and regulatory risk of being the infrastructure layer for a fraud-enabling authentication method outweighs the near-term revenue.

What Replaces OTP

The replacement for SMS OTP in financial services isn't a new form of one-time code. It's a fundamentally different authentication architecture built on FIDO2/WebAuthn passkeys. A passkey credential is device-bound and uses the device's biometric sensor - Face ID, fingerprint - as the authentication gesture. The credential is cryptographically tied to the specific relying party, meaning it cannot be used on a fraudulent lookalike site. It is never transmitted, meaning it cannot be intercepted. It cannot be socially engineered out of a customer, because there is no code to share - the authentication happens on the device, between the device and the bank, without the customer needing to do anything beyond presenting their biometric.

Against every attack pattern in the OTP vulnerability stack, passkeys have a structural defense. SIM swap attacks are irrelevant because passkeys don't touch the telephony network. SS7 interception is irrelevant because nothing is transmitted over SMS. Real-time phishing kits capture nothing because the credential is domain-bound and won't authenticate against a fraudulent site. Social engineering fails because there's no code for the customer to read out.

The Transition Challenge

None of this means the transition away from SMS OTP is frictionless. Financial institutions that have built their authentication infrastructure on OTP face real implementation work: migrating existing customers to passkeys, redesigning enrollment flows, building fallback and recovery paths, and managing the complexity of running two authentication systems in parallel during the transition period.

The customer communication challenge is real as well. SMS OTP trained customers to expect a code. Moving to passkeys requires retraining that expectation - explaining why the new experience is different, why it's better, and what to do when it doesn't work as expected. Done poorly, the transition creates customer service burden. Done well, it creates a materially better experience that customers quickly prefer.

The Window for Leadership

Financial services institutions that move away from SMS OTP now - before the next regulatory mandate in their jurisdiction makes it compulsory - gain something meaningful: they get to do the transition on their own timeline, with the ability to invest in doing it well rather than scrambling to comply.

The institutions that wait will do the same transition, under more time pressure, with less ability to invest in the enrollment experience that drives adoption. The security outcome will eventually be the same. But the customer experience, and the competitive positioning during the transition window, will be different.

The SMS OTP exit is underway. The question is whether your institution leads it or follows.

Sources

UAE Central Bank - centralbank.ae

FIDO Alliance - Passkeys

FIDO Alliance - FIDO2 Specifications

NIST SP 800-63-4 - Digital Identity Guidelines

EBA - PSD2 Strong Customer Authentication RTS

ENISA - NIS2 Directive

Bangko Sentral ng Pilipinas - bsp.gov.ph

State Bank of Vietnam - sbv.gov.vn

How exposed is your auth stack?

Most orgs running OTP-based MFA have 3–4 exploitable gaps they don’t know about. Our Authentication Assessment takes 2 minutes and shows you exactly where you stand — plus a phased migration roadmap.

Take the Assessment →

Built by Ideem

Device-bound passkeys and A2A payment authentication. One SDK. No OTPs, no redirects.

Weekly newsletter
No spam. Just the latest releases and tips, interesting articles, and exclusive interviews in your inbox every week.
Read about our privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Think your MFA is solid? Let's find out.

Our 2-minute assessment scores your authentication setup and shows you exactly where the improvements are.

See Your Score →

Ideem replaces OTPs with device-bound passkeys. See how your stack measures up →

Free Assessment →

Before you go —

Ideem replaces the authentication patterns described in this post. Two minutes to see where your stack stands.

8 questions. 2 minutes. Get a phased migration roadmap.

Take the 2-Min Assessment →No thanks, I’ll skip for now