MFA Fatigue Attacks: What They Are and How to Stop Them
MFA fatigue (also called MFA bombing or push harassment) bypasses multi-factor authentication without any phishing link or malware. Attackers just keep sending push notifications until a tired or confused user taps "Approve". Here's how to stop it.
How MFA fatigue works
Standard push-based MFA (like Microsoft Authenticator or Duo with simple approve/deny prompts) has a fundamental weakness: it relies on the user knowing that they initiated a login. Attackers exploit this by:
- Obtaining valid credentials (via phishing, password spray, or credential dump)
- Repeatedly attempting to sign in, triggering push notification after push notification
- Sending the target messages claiming to be IT support: "We're updating your account, please approve the login request"
- Waiting until the user approves โ from fatigue, confusion, or social engineering
Why standard push MFA is vulnerable
The approve/deny prompt gives users no context about what they're approving. A user who receives 20 push notifications in 10 minutes at 11pm has no way to distinguish between "someone is attacking my account" and "something is broken with our SSO". Many just tap approve to make it stop.
| MFA type | Fatigue resistant? | Phishing resistant? |
|---|---|---|
| SMS OTP | No | No (SIM swap) |
| Push approve/deny | No | No |
| Push with number matching | Yes | Partial |
| TOTP authenticator app (6-digit code) | Yes | No (AiTM) |
| FIDO2 / passkey / hardware key | Yes | Yes |
The fix: enable number matching
Number matching is the fastest, no-cost mitigation for push-based MFA fatigue. Instead of a simple approve/deny prompt, the authenticator app shows a 2-digit number that the user must type โ and the sign-in page shows a matching number. An attacker triggering requests can no longer be accidentally approved because the user has to actively read and type a number they can only see if they initiated the login.
Enable number matching in Microsoft 365
- Go to Entra ID โ Authentication methods โ Microsoft Authenticator
- Click Configure
- Under "Require number matching", set to Enabled for all users
- Also enable Show application name in push and passwordless notifications and Show geographic location in push notifications
As of 2025, Microsoft has enabled number matching by default for new tenants, but many existing tenants still have it off. Check yours.
Enable number matching in Google Workspace
Google Workspace doesn't use push-based MFA in the same way โ Google Prompt requires user interaction that already includes contextual information. However, upgrading to Security Keys (FIDO2) or Google Passkeys is the phishing-resistant step up:
- Admin console โ Security โ Authentication โ 2-Step Verification
- Under "Allowed second factors", enable Security Key
- Optionally enforce for high-risk users (admins, finance, executives)
Going further: phishing-resistant MFA
Number matching stops fatigue attacks but not adversary-in-the-middle (AiTM) phishing โ where attackers proxy authentication in real time and steal session tokens even when MFA is passed. The only way to stop AiTM is phishing-resistant MFA:
- FIDO2 hardware keys (YubiKey, Google Titan) โ bound to the site origin, can't be proxied
- Passkeys โ same cryptographic binding, built into modern devices
- Windows Hello for Business โ device-bound, phishing-resistant, no additional hardware needed
- Certificate-based authentication (CBA) โ enterprise environments with PKI
How to detect MFA fatigue attempts in your logs
In Entra ID โ Sign-in logs, filter for:
- Authentication result: MFA denied, user declined the request
- Multiple failed MFA attempts from the same IP in a short window
- Sign-in attempts at unusual hours (middle of night for the user's timezone)
- MFA fraud alerts โ users can report suspicious push requests in the Authenticator app
A pattern of dozens of MFA denials followed by a single approval is a strong indicator of a successful fatigue attack.
๐ฌ Weekly security digest
Identity attack techniques, workspace security tips, and product updates. No spam.
Check if number matching is enabled in your tenant
Workspace Posture Pro audits your M365 or Google Workspace every week โ including MFA configuration gaps, number matching status, and legacy auth settings โ and emails you a prioritised fix list every Monday.
Start Workspace Posture Pro โ $19/mo โEarly access ยท rate locked forever ยท cancel anytime