Here’s how a typical MFA fatigue attack unfolds:
The MFA fatigue attack is aimed specifically at the MFA level of a layered access control system, having gained login credentials, and trying to access the systems protected. By linking together the pieces of the attack chain, the MFA bypass enables hackers to:
In addition to the basic MFA attack we discussed above, there are other variations that malicious actors use to exploit human psychology and bypass MFA security. We’ll discuss some of them below:
Attackers create a sense of urgency by sending MFA requests with messages like "Your account will be locked if you don't approve this request immediately." This tactic preys on the user’s fear of losing access to their account.
They disguise themselves as a trusted entity, like a colleague, manager or IT support, to convince the user to approve the MFA request. For example, “Hi, this is John from IT. We need you to approve this MFA request to update your security settings."
They may time their malicious MFA requests to coincide with the user’s normal login times or during periods of high activity. This makes it more likely for the user to unknowingly approve a malicious request, as it blends in with their usual workflow.
There are several high-profile incidents that highlight the effectiveness of MFA fatigue attacks. Here are some examples:
In May 2022, an attacker used a combination of MFA fatigue and sophisticated vishing (voice phishing) techniques to compromise a Cisco employee’s account. The employee was bombarded with a relentless series of voice calls and push notifications for login approval. Eventually, they succumbed to the attacker’s persistence, and approved a fraudulent MFA request, granting the attacker access to the Cisco network.
In September 2022, a malicious actor stole the credentials of a contractor at Uber. They then repeatedly triggered MFA requests until the user, overwhelmed by the constant notifications, approved one. As a result, the malicious actor was able to access several of Uber’s internal systems, and even disrupt some of their services.
In 2024, Apple customers fell victim to MFA fatigue attacks. Hackers managed to bypass security measures, including CAPTCHA challenges and rate limits on the "forgot password" page, to bombard users with repeated MFA requests.
MFA fatigue is a serious threat, but there are steps that organizations can take to mitigate the security risks. For example, they can: