Multi-factor authentication (MFA) has long been considered a cornerstone of modern security. Yet despite widespread adoption, attackers continue to breach organizations that have MFA deployed. How? Through MFA fatigue attacks.
What is an MFA Fatigue Attack?
MFA fatigue attacks, also known as "push bombing" or "MFA spam attacks," exploit human psychology rather than technical vulnerabilities. Here's how they work:
- Initial Compromise: Attacker obtains valid credentials (phishing, credential stuffing, etc.)
- Bombardment: Attacker attempts to log in repeatedly, triggering dozens or hundreds of MFA push notifications
- Fatigue: User becomes annoyed by constant notifications
- Approval: User either accidentally or intentionally approves a request to stop the notifications
- Access Granted: Attacker gains access to the account
Real-World Impact
According to Cisco Talos' 2024 Q1 Incident Response report, 25% of all incident response engagements involved MFA fatigue attacks. This isn't a theoretical threat—it's happening right now to organizations of all sizes.
Notable Attacks
- Uber (2022): Attacker used MFA fatigue to compromise an employee's account, leading to a significant breach
- Microsoft (2022): DEV-0537 group used MFA fatigue attacks against multiple organizations
- Okta Incidents: Multiple customer breaches involving MFA fatigue techniques
Why Traditional MFA Isn't Enough
Traditional MFA systems suffer from several weaknesses:
1. No Context Awareness
Push notifications provide no context about:
- Where the login attempt originated
- Whether the location makes sense given user's normal patterns
- Risk level of the request
2. Notification Fatigue
Users receive push notifications for many services throughout the day. One more notification—even a suspicious one—can blend in.
3. No Rate Limiting
Many MFA systems don't limit the number of push notifications that can be sent to a user in a short time period.
4. Limited User Education
Users aren't always trained to:
- Never approve MFA requests they didn't initiate
- Report suspicious MFA requests immediately
- Understand the implications of approving a request
How to Defend Against MFA Fatigue
Immediate Actions
-
Enable Number Matching
- Require users to enter a number shown in their authentication app
- Makes accidental approval much harder
-
Implement Rate Limiting
- Limit MFA push notifications per user per time period
- Block accounts after multiple failed attempts
-
Add Geolocation Context
- Show users where the login attempt originated
- Alert on impossible travel scenarios
-
User Training
- Regular security awareness training
- Simulate MFA fatigue attacks
- Clear reporting procedures
Advanced Protections
-
Context-Aware Authentication
- Analyze device, location, time, and behavior patterns
- Require step-up authentication for risky requests
- Block obviously suspicious requests automatically
-
Hardware Security Keys
- FIDO2/WebAuthn keys are immune to MFA fatigue
- Can't be phished or bypassed through fatigue
-
Continuous Monitoring
- Alert security teams on multiple MFA denials
- Monitor for impossible travel
- Track authentication patterns
-
Automated Response
- Automatically block accounts showing MFA fatigue patterns
- Require security team approval to unblock
- Contain threats before they spread
The Auth Sentry Approach
At Hummingbird Security, we built Auth Sentry specifically to detect and respond to attacks like MFA fatigue. Our platform:
- Detects MFA fatigue patterns in real-time across all your identity providers
- Provides context to security teams about what's happening and why it matters
- Automatically contains threats by blocking suspicious accounts before damage occurs
- Reduces alert fatigue by providing vetted, actionable intelligence
Conclusion
MFA fatigue attacks demonstrate that no single security control is sufficient. You need:
- Strong authentication (MFA with number matching or hardware keys)
- Behavioral analysis (detecting abnormal patterns)
- Automated response (containing threats immediately)
- User education (training your human firewall)
The organizations that successfully defend against MFA fatigue are those that treat identity security as a system-wide challenge, not a checkbox compliance exercise.
Want to learn how Auth Sentry can protect your organization from MFA fatigue attacks? Request a free trial to see our platform in action.
Questions about this post? Contact us at [email protected]