In today’s fast-paced digital landscape, businesses are increasingly turning to Multi-Factor Authentication (MFA) as a critical layer of security. As cyber threats continue to evolve, MFA is widely recognised as a fundamental tool for protecting sensitive data and reducing the risks associated with password-based vulnerabilities. However, despite its growing adoption, organisations face a rising threat: MFA fatigue.
In this article, we will delve into what MFA fatigue is, how it works, and why it poses a growing security concern. We’ll also explore strategies that businesses can implement to mitigate the risk of MFA fatigue attacks and ensure a robust, comprehensive approach to cyber security.
The role of MFA in cyber security
Multi-Factor Authentication (MFA) is a security measure that requires users to provide multiple forms of identification to verify their identity before granting access to a system. These authentication factors typically fall into three categories:
Something you know: A password or PIN.
Something you have: A security token, mobile device, or authentication app.
Something you are: Biometric identifiers, such as fingerprints or facial recognition.
By requiring more than one factor to authenticate a user’s identity, MFA significantly enhances security. This added layer of protection is particularly important in a world where credentials are often compromised through phishing, brute force attacks, or even leaks on the dark web. MFA has become the cornerstone of identity and access management (IAM) for organisations seeking to adopt a zero-trust security model, ensuring that even if credentials are stolen, attackers cannot gain access to systems without meeting the additional authentication requirements.
However, MFA is not immune to exploitation. As businesses increasingly implement MFA solutions, attackers are finding new and creative ways to bypass these security measures. One of the most alarming of these tactics is MFA fatigue.
What are MFA fatigue attacks?
MFA fatigue attacks, also known as MFA bombing or push notification spamming, occur when attackers bombard a user with repeated MFA prompts, hoping to overwhelm them into granting access. In these attacks, the threat actor uses stolen credentials to initiate an authentication request, triggering an MFA prompt to the user’s device. The attacker then continuously sends these notifications, creating user fatigue in the hopes that the victim will approve a prompt to stop the relentless notifications.
While MFA fatigue attacks are often associated with Business Email Compromise (BEC) incidents, they can be used in various attack scenarios. Whether an attacker is targeting a user’s personal account, attempting lateral movement within a network, or seeking to escalate their privileges, MFA fatigue is proving to be an effective attack vector.
How MFA fatigue attacks work
The process of an MFA fatigue attack generally follows these steps:
Credential Acquisition: The attacker first gains access to the victim’s login credentials. This may be through previous compromises such as phishing, brute force attacks, or purchasing the credentials on the dark web.
Initiating the MFA Prompt: With the stolen credentials in hand, the attacker attempts to log in to the targeted account. This triggers an MFA prompt that is sent to the victim’s device.
Bombarding with MFA Notifications: If the victim ignores or denies the prompt, the attacker continues sending MFA notifications in rapid succession, overwhelming the user.
Access Gained: At some point, the victim, frustrated by the constant barrage of notifications, approves the request, believing it to be legitimate. This action grants the attacker access to the account.
Once the attacker has gained access, they can carry out a range of malicious actions, from exfiltrating sensitive data to compromising an organisation’s internal systems. The effectiveness of MFA fatigue attacks hinges on the human element, manipulating the victim’s behavioural fatigue rather than exploiting flaws in the MFA system itself.
Why MFA Fatigue Is a Growing Concern
As businesses continue to expand their reliance on MFA for securing their digital environments, the risk-based authentication model has become a fundamental aspect of cybersecurity strategies. MFA has become a trusted measure to safeguard against data breaches, fraudulent MFA requests, and gaining unauthorised access to sensitive systems. However, attackers are adapting their tactics to bypass MFA controls, and MFA fatigue attacks are becoming an increasingly prominent threat.
In fact, statistics indicate that MFA spamming is on the rise. The volume of repeated MFA requests is growing, especially as organisations increase their reliance on MFA for protecting systems and applications. Attackers understand that most users will eventually succumb to fatigue and approve an authentication request, granting them access to otherwise protected systems.
In a 2023 incident, a teenage hacker used MFA fatigue to compromise the transportation giant Uber’s network. The attacker sent repeated MFA prompts to a user and, through social engineering, convinced them to approve the request, ultimately leading to a breach. This event highlighted the growing risks of MFA fatigue and demonstrated the potential for cybercriminals to exploit human error in the authentication process.

How to Prevent MFA Fatigue Attacks
While MFA is an essential security measure, organisations must take proactive steps to prevent MFA fatigue attacks and ensure that their security systems are not vulnerable to this form of manipulation. Here are some key strategies to reduce the risk:
Limit the Number of MFA Notifications
One effective way to prevent MFA fatigue is to limit the number of MFA push notifications a user can receive within a specific timeframe. By restricting the volume of notifications, organisations can reduce the likelihood that attackers will overwhelm users with repeated MFA requests. This measure ensures that legitimate authentication requests are not drowned out by unnecessary prompts.
Disable MFA Push Notifications
A common method for preventing MFA fatigue is to replace push notifications with more secure and complex authentication methods. Instead of sending simple “yes/no” prompts, organisations can opt for time-based one-time passwords (TOTP) or challenge-response authentication methods. These alternatives can reduce the ease with which attackers can manipulate the authentication process.
For example, Google Authenticator and Microsoft Authenticator offer TOTP-based solutions that require users to manually enter a code generated by an authentication app, reducing the reliance on push notifications.
Implement Adaptive Authentication
Adaptive authentication is an advanced security measure that evaluates the context of a login attempt before triggering an MFA prompt. By factoring in elements such as geolocation, device type, or historical login data, adaptive authentication can assess whether a login attempt is suspicious and adjust the authentication requirements accordingly. This approach reduces the number of MFA prompts users receive and ensures that legitimate logins are processed efficiently.
Integrate Web Authentication Solutions
Web-based authentication tools, such as security keys and biometric authentication, provide higher levels of security than traditional MFA methods. These tools offer a more robust defence against MFA fatigue by requiring multiple factors of authentication before granting access to a system. By integrating these solutions into your authentication infrastructure, you can significantly reduce the likelihood of a successful MFA bombing attack.
Educate Users on MFA Fatigue and Security Best Practices
One of the most effective ways to prevent MFA fatigue attacks is through user education. Organisations must ensure that their employees understand the risks of MFA fatigue attacks and know how to recognise suspicious login attempts. Employees should be taught not to approve authentication requests unless they can verify their legitimacy and should report any suspicious behaviour immediately.
Security teams should also include MFA fatigue in their security awareness training programs, helping users understand how to identify potential threats, such as fraudulent MFA requests or suspicious behaviour.
Monitor for Unusual Login Behaviour
Effective threat detection and monitoring solutions are essential for identifying and responding to MFA fatigue attacks. Implementing a Managed Detection and Response (MDR) solution can help organisations detect abnormal patterns of MFA prompts and suspicious login attempts. By continuously monitoring for unusual login activities, organisations can respond quickly and prevent attackers from gaining access to critical systems.
Strengthen Your IAM Framework
MFA should not be the only layer of protection in an organisation’s identity and access management (IAM) strategy. A robust IAM framework, which incorporates zero-trust principles, Identity Detection and Response (IDR), and advanced monitoring technologies, can help organisations stay ahead of emerging threats like MFA fatigue.
By combining MFA solutions with advanced authentication techniques, threat detection systems, and user education, businesses can significantly improve their overall security posture and reduce the risks associated with MFA fatigue attacks.
Conclusion
MFA remains a cornerstone of modern cyber security, but as attackers adapt and innovate, so must our defences. MFA fatigue attacks are a growing threat that exploit the very mechanisms designed to protect us. By implementing a comprehensive, multi-layered security approach that includes adaptive authentication, user education, and advanced monitoring, businesses can protect themselves from the risks associated with MFA fatigue and ensure that their authentication systems remain secure.
At Zenzero, we understand the evolving nature of cyber security threats and are committed to providing businesses with the tools and support they need to stay ahead of the curve. Our Managed IT services include robust MFA solutions, identity management, and security monitoring to help protect your organisation from the growing threat of MFA fatigue and other emerging cyber risks.
If you’re looking for expert support in securing your business against MFA fatigue attacks, get in touch with us today. Together, we can strengthen your security infrastructure and ensure your sensitive data remains protected from evolving cyber threats.
