Multi-factor authentication fatigue attack explained
A multi-factor authentication fatigue attack (also MFA fatigue attack or MFA bombing) is a computer security attack against multi-factor authentication that makes use of social engineering.[1] [2] [3] When MFA applications are configured to send push notifications to end users, an attacker can send a flood of login attempts in the hope that a user will click on accept at least once.
In September 2022 Uber security was breached by a member of Lapsus$ using a multi-factor fatigue attack.[4] [5]
In 2022, Microsoft has deployed a mitigation against MFA fatigue attacks with their authenticator app.[6]
In early 2024, a small percentage of Apple consumers experienced a MFA fatigue attack that was caused by a hacker that bypassed the rate limit and Captcha on Apple’s “Forgot Password” page.
Further reading
Notes and References
- Web site: MFA Fatigue: Hackers’ new favorite tactic in high-profile breaches . 2023-01-26 . . en-us.
- Web site: Burt . Jeff . Multi-factor authentication fatigue can blow open security . 2023-01-26 . www.theregister.com . en.
- Web site: Constantin . Lucian . 2022-09-22 . Multi-factor authentication fatigue attacks are on the rise: How to defend against them . 2023-01-26 . CSO Online . en.
- News: How do you stop another Uber hack? . Whittaker . Zack . 2022-09-19 . 2023-08-24 . TechCrunch.
- News: Uber explains how it was pwned this month, points finger at Lapsus$ gang . Hardcastle . Jessica Lyons . 2022-09-19 . 2023-08-24 . The Register.
- Web site: Tung . Liam . Microsoft Authenticator gains feature to thwart spam attacks on MFA . 2023-01-26 . . en.