SecurityMay 18, 20267 min read

How to Protect Yourself From MFA Fatigue Attacks

SC

By Sarah Chen

Head of Privacy Research

How to Protect Yourself From MFA Fatigue Attacks

You set up two-factor authentication to protect your accounts. But what happens when an attacker turns that security feature against you? MFA fatigue attacks — also called push bombing or MFA bombing — exploit your authentication app by flooding it with approval requests until you accidentally tap "Approve" out of exhaustion or confusion. It's one of the fastest-growing attack methods in 2026, and it's bypassing one of the most trusted security measures we have.

How MFA Fatigue Attacks Work

The attack follows a straightforward but effective pattern:

  1. The attacker steals your password through a data breach, phishing attack, credential stuffing, or by purchasing it on the dark web
  2. They attempt to log into your account using the stolen credentials
  3. Your MFA system triggers a push notification asking you to approve the login
  4. You decline (or ignore) the notification — so the attacker tries again. And again. And again.
  5. They send dozens or even hundreds of push requests over minutes or hours, often between midnight and 5 AM when you're asleep or distracted
  6. Eventually, you tap "Approve" — either by accident while half-asleep, out of frustration, or because you assume it's a system glitch

Some attackers pair the notification flood with a phone call, pretending to be IT support and claiming you need to approve the prompt to fix an account issue.

Real-World Impact

MFA fatigue attacks have been used against major organizations including Uber, Cisco, and Microsoft. In Uber's 2022 breach, an attacker bombarded an employee with push notifications for over an hour before the employee approved one — giving the attacker access to internal systems. These attacks continue to grow in sophistication and frequency.

Why This Attack Is So Effective

MFA fatigue exploits human psychology rather than technical vulnerabilities:

  • Fatigue and annoyance: After 20+ notifications, people just want them to stop
  • Sleep disruption: Attacks launched at 2 AM catch people at their least alert
  • Confusion: Users may assume the notifications are a system error, not an attack
  • Social engineering: A convincing phone call from "IT support" adds urgency and legitimacy
  • Lack of awareness: Most security training covers phishing emails but rarely mentions push bombing

How to Protect Yourself

1. Switch to Phishing-Resistant Authentication

The most effective defense is eliminating push notifications entirely by switching to passkeys or FIDO2 security keys. These use cryptographic authentication tied to your device — an attacker can't remotely trigger a prompt because there's nothing to approve. Your device verifies your identity through a fingerprint, face scan, or physical key press.

2. Enable Number Matching

If you must use push-based MFA, enable number matching (sometimes called "verified push"). Instead of a simple Approve/Deny prompt, the login screen shows a two-digit number that you must type into your authenticator app. This prevents accidental approvals because you can't just tap a button — you have to actively read and enter a code, which forces you to recognize whether the login attempt is legitimate.

Number matching is supported by Microsoft Authenticator, Duo, Okta, and other major MFA providers.

3. Use TOTP Codes Instead of Push

Time-based one-time passwords (TOTP) — the six-digit codes that rotate every 30 seconds in apps like Google Authenticator or Authy — can't be exploited through push bombing because there's no notification to spam. The attacker would need physical access to your authenticator app.

4. Never Approve Unexpected Prompts

This is the single most important habit: if you didn't just try to log in, always deny the prompt. Legitimate systems will never send you repeated authentication requests. If you receive multiple unexpected push notifications, your password has been compromised and you should change it immediately.

5. Report Suspicious Activity Immediately

If you receive unexpected MFA prompts, report it to your IT department (at work) or immediately change the password for the affected account. Multiple push requests mean an attacker has your password — not that the system is malfunctioning.

The #1 Rule

If you didn't just try to log in, don't approve the notification. Period. No legitimate IT department will ever call you and ask you to approve a push notification. If someone does, hang up and call IT directly using a number you know is real.

Set Up Stronger Authentication Today

Here's a quick prioritization for upgrading your MFA:

  1. Email accounts: Switch to passkeys or security keys — email is the gateway to all your other accounts
  2. Financial accounts: Enable the strongest MFA option available (many banks now support security keys)
  3. Cloud storage: Google Drive, Dropbox, iCloud — protect files that contain personal information
  4. Social media: Accounts that could be used for impersonation or social engineering
  5. Work accounts: Follow your organization's security policies, but advocate for phishing-resistant options

MFA Fatigue Starts With a Stolen Password

Remember: an attacker can't launch a push bombing attack unless they already have your password. That password was likely stolen in a data breach or obtained from the dark web. PrivacyOn includes dark web monitoring that alerts you when your credentials appear in breaches, giving you time to change your password before attackers can exploit it. Combined with data broker removal from 100+ sites and family plans for up to 5 people starting at $8.33/month, PrivacyOn helps close the gaps that make MFA fatigue attacks possible in the first place.

SC
Sarah Chen

Head of Privacy Research

CIPP/US CertifiedIAPP MemberB.S. Computer Science

CIPP/US-certified privacy researcher with over a decade of experience helping consumers remove their personal information from data brokers.

Ready to Protect Your Privacy?

Let PrivacyOn automatically remove your personal information from data broker sites and keep it removed.