
SCARS Institute’s Encyclopedia of Scams™ Published Continuously for 25 Years

MFA (Multi-Factor Authentication) Fatigue Attacks – 2024
A Cyberattack to Counter Multi-Factor Authentication
Catalog of Scams – A SCARS Institute Insight
Author:
• SCARS Institute Encyclopedia of Scams Editorial Team – Society of Citizens Against Relationship Scams Inc.
Article Abstract
An MFA fatigue attack is a cyber tactic where attackers bombard a victim’s device or account with repeated multi-factor authentication (MFA) push notifications until the victim becomes overwhelmed or annoyed.
The goal is to exhaust the target, eventually leading them to accidentally approve one of the authentication requests, thereby giving the attacker access to their account.

MFA (Multi-Factor Authentication) Fatigue Attacks are Increasing and People are Becoming Victims
Introduction
Multi-factor authentication (MFA) is a security method that requires users to provide more than one form of verification to access an account or application. MFA is an important way to protect online accounts and the data they contain, and it’s becoming more common as cyber threats increase.
An MFA fatigue attack is a method used by cybercriminals to exploit the human element of multi-factor authentication (MFA) systems. In these attacks, an attacker who has already obtained a user’s login credentials bombards the user’s device with continuous MFA push notifications, attempting to wear them down to the point where the user mistakenly or out of frustration approves the authentication request, thereby granting the attacker access to their account.
These attacks exploit the human element of MFA security. Instead of bypassing MFA through technical means, the attacker uses persistence, hoping the user will inadvertently approve the request, thinking it’s legitimate or simply to stop the flood of notifications. This type of attack often accompanies other social engineering methods, such as impersonating IT support to convince the victim that the notifications are legitimate.
This attack method has been used by groups like Scattered Spider and has proven effective against high-profile targets when traditional security defenses are in place
How MFA Fatigue Attacks Work
Here are the MFA Fatigue Attack steps:
- Credential Compromise: The attacker initially gains access to the victim’s username and password, usually through phishing or other social engineering tactics.
- MFA Bombardment: With credentials in hand, the attacker tries to log into the victim’s account. This triggers the MFA system to send repeated push notifications or prompts to the user’s mobile device or email.
- Exhausting the User: The attacker continues to send these authentication requests at frequent intervals. Over time, the victim may become overwhelmed, annoyed, or confused by the barrage of prompts.
- Unintentional Approval: The aim is for the user to accidentally approve one of the prompts, either out of confusion, frustration, or a mistaken belief that it’s legitimate. Once approved, the attacker gains full access to the account.
Examples of MFA Fatigue Attacks
- Uber Hack (2022): A high-profile MFA fatigue attack occurred during the Uber hack in 2022. The attacker obtained an employee’s login credentials and initiated an MFA fatigue attack by repeatedly sending push notifications to the employee’s phone. Eventually, the employee approved one of the authentication requests, allowing the attacker to breach Uber’s internal systems. The hacker then gained access to sensitive company information and openly taunted Uber’s security team.
- Okta Hack (2022): Another example involved Scattered Spider (LUCR-3), which targeted the identity provider Okta. Attackers used MFA fatigue to target an employee of a subcontractor to Okta. After a series of push notifications, the employee inadvertently granted access, allowing attackers to infiltrate Okta’s systems and later other client companies through the breached identity platform.
How to Prevent MFA Fatigue Attacks
- Educating Users: One of the most effective ways to prevent MFA fatigue attacks is through user awareness. Employees and individuals need to be educated about the dangers of approving unexpected MFA requests. If they receive repeated MFA prompts they did not initiate, they should report the incident to their IT or security team immediately.
- Time-based Lockouts: Organizations can configure MFA systems to temporarily lock accounts after a certain number of failed or rejected MFA attempts. This reduces the likelihood of an attacker successfully exploiting MFA fatigue.
- Phishing-resistant MFA: Using stronger forms of authentication, such as hardware-based security keys (like FIDO2 or YubiKey), can make it harder for attackers to bypass MFA by reducing reliance on push notifications or SMS codes.
- Additional Authentication Layers: Adding extra layers of security, such as biometric authentication or requiring contextual information (like location or device) to approve logins, can make it harder for attackers to succeed.
MFA fatigue attacks demonstrate how social engineering can bypass even robust security measures by exploiting human error and frustration. As attackers continue to evolve their techniques, organizations must combine technical controls with user training to mitigate the risks.
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
Article Rating
Table of Contents
POPULAR ARTICLES
RATE THIS ARTICLE?
LEAVE A COMMENT?
Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.
Recent Comments
On Other Articles
on Resilience Coping Recovery And Romance Scam Victims [UPDATED 2024]: “I am grateful to SCARS for providing supportive information and guidance in a very overwhelming situation. The education I have…” May 13, 19:19
on Scam Victim’s Responsibilities: “This article with the list of steps toward recovery and the video are thoughtful, beautiful and thought provoking. With the…” May 12, 21:12
on Scam Victim Apathy – Scams Are Somebody Else’s Problem: “Thank you for this article. I had no idea of the Tall Poppy Syndrome. However I have experienced as a…” May 12, 20:31
on Disengaging From A Fake Scam Relationship: “This article felt like a trip back in time and a reminder of how far I’ve come. At first, the…” May 12, 18:33
on Cognition and Trauma – The Impact Of Relationship Scams – UPDATED 2024: “This is a great article that assures me I’m not crazy and that what I went through, and still struggle…” May 12, 09:13
on Scam Victim Panic Attacks: “I’m grateful that I don’t have panic attacks. I did have high levels of anxiety that caused me to self-isolate…” May 12, 08:48
on Brain Fog Caused By Scam Related PTSD: “I experienced all of the examples of brain fog in the weeks after the scam ended. I was in a…” May 11, 22:34
on Report Scammers: “My gosh! I should have done a reverse photo lookup before deepening the conversation with a scammer. A man claiming…” May 11, 15:09
on Scam Victim’s/Survivor’s Guide To Writing Your Own Book About Your Experience – For Healing & Profit – 2024: “This is a concept of processing my emotions I had not considered. However, it will never be. The scammers impersonated…” May 11, 12:27
on Trauma Grief & Humor As A Coping Mechanism: “Humor is not something I’ve been able to participate much with. It has been a slow gradual process to be…” May 11, 12:17
Important Information for New Scam Victims
- Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
- Enroll in FREE SCARS Scam Survivor’s School now at www.SCARSeducation.org
- Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
A Note About Labeling!
We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
Statement About Victim Blaming
Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and to not blame themselves, better develop recovery programs, and to help victims avoid scams in the future. At times this may sound like blaming the victim, but it does not blame scam victims, we are simply explaining the hows and whys of the experience victims have.
These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens and then they can learn how their mind works and how to overcome these mechanisms.
Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org
Psychology Disclaimer:
All articles about psychology and the human brain on this website are for information & education only
The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.
Sempre achei invasivo deixar a minha localização em qualquer sítio ‘web’, mas pelos vistos é útil.