How can criminals bypass multi-factor authentication (MFA)?