๐Ÿ“Š Dashboard ๐ŸŸข Pulse โœ‰ Inbox Shield ๐Ÿข Workspace Posture ๐Ÿ“‹ Compliance ๐Ÿ›ก๏ธ BrandGuard

MFA Fatigue Attacks: What They Are and How to Stop Them

MFA fatigue (also called MFA bombing or push harassment) bypasses multi-factor authentication without any phishing link or malware. Attackers just keep sending push notifications until a tired or confused user taps "Approve". Here's how to stop it.

How MFA fatigue works

Standard push-based MFA (like Microsoft Authenticator or Duo with simple approve/deny prompts) has a fundamental weakness: it relies on the user knowing that they initiated a login. Attackers exploit this by:

  1. Obtaining valid credentials (via phishing, password spray, or credential dump)
  2. Repeatedly attempting to sign in, triggering push notification after push notification
  3. Sending the target messages claiming to be IT support: "We're updating your account, please approve the login request"
  4. Waiting until the user approves โ€” from fatigue, confusion, or social engineering
Real-world example: The 2022 Uber breach started with MFA fatigue. The attacker obtained contractor credentials, spammed them with Authenticator push requests for over an hour, then sent a WhatsApp message posing as Uber IT asking them to approve. The contractor approved. The attacker had internal access within minutes.

Why standard push MFA is vulnerable

The approve/deny prompt gives users no context about what they're approving. A user who receives 20 push notifications in 10 minutes at 11pm has no way to distinguish between "someone is attacking my account" and "something is broken with our SSO". Many just tap approve to make it stop.

MFA typeFatigue resistant?Phishing resistant?
SMS OTPNoNo (SIM swap)
Push approve/denyNoNo
Push with number matchingYesPartial
TOTP authenticator app (6-digit code)YesNo (AiTM)
FIDO2 / passkey / hardware keyYesYes

The fix: enable number matching

Number matching is the fastest, no-cost mitigation for push-based MFA fatigue. Instead of a simple approve/deny prompt, the authenticator app shows a 2-digit number that the user must type โ€” and the sign-in page shows a matching number. An attacker triggering requests can no longer be accidentally approved because the user has to actively read and type a number they can only see if they initiated the login.

Enable number matching in Microsoft 365

  1. Go to Entra ID โ†’ Authentication methods โ†’ Microsoft Authenticator
  2. Click Configure
  3. Under "Require number matching", set to Enabled for all users
  4. Also enable Show application name in push and passwordless notifications and Show geographic location in push notifications

As of 2025, Microsoft has enabled number matching by default for new tenants, but many existing tenants still have it off. Check yours.

Enable number matching in Google Workspace

Google Workspace doesn't use push-based MFA in the same way โ€” Google Prompt requires user interaction that already includes contextual information. However, upgrading to Security Keys (FIDO2) or Google Passkeys is the phishing-resistant step up:

  1. Admin console โ†’ Security โ†’ Authentication โ†’ 2-Step Verification
  2. Under "Allowed second factors", enable Security Key
  3. Optionally enforce for high-risk users (admins, finance, executives)

Going further: phishing-resistant MFA

Number matching stops fatigue attacks but not adversary-in-the-middle (AiTM) phishing โ€” where attackers proxy authentication in real time and steal session tokens even when MFA is passed. The only way to stop AiTM is phishing-resistant MFA:

Recommendation: Roll out number matching immediately for all users โ€” it's free, takes 5 minutes, and eliminates the most common MFA bypass vector. Then plan a FIDO2 or passkey rollout for admins and high-risk roles over the next quarter.

How to detect MFA fatigue attempts in your logs

In Entra ID โ†’ Sign-in logs, filter for:

A pattern of dozens of MFA denials followed by a single approval is a strong indicator of a successful fatigue attack.

๐Ÿ“ฌ Weekly security digest

Identity attack techniques, workspace security tips, and product updates. No spam.

โœ… You're in. Check your inbox.

Check if number matching is enabled in your tenant

Workspace Posture Pro audits your M365 or Google Workspace every week โ€” including MFA configuration gaps, number matching status, and legacy auth settings โ€” and emails you a prioritised fix list every Monday.

Start Workspace Posture Pro โ€” $19/mo โ†’

Early access ยท rate locked forever ยท cancel anytime