Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 676

MFA Fatigue (Push Bombing)

What is MFA Fatigue (Push Bombing)?

MFA Fatigue (Push Bombing)Attack in which an adversary with a valid password floods the victim with MFA push prompts until the user approves one out of confusion or annoyance.


MFA fatigue, also called push bombing, exploits push-based multi-factor authentication. After obtaining a valid password through phishing or credential stuffing, the attacker repeatedly initiates logins, triggering a stream of mobile push approvals on the victim's phone. Eventually the user taps Approve to make the noise stop, or believes the prompt is legitimate. Notable incidents include the 2022 Uber breach and the 2022 Cisco intrusion, both linked to Lapsus$ and EXOTIC LILY tradecraft. Mitigations include number matching, push verification with context, rate limiting prompts, blocking after repeated denials, and migrating to phishing-resistant FIDO2 or passkeys.

Examples

  1. 01

    Uber 2022: an EXT contractor approved a push notification after dozens of attempts, granting initial access.

  2. 02

    Cisco 2022: attackers used vishing plus push bombing to bypass MFA on a corporate VPN.

Frequently asked questions

What is MFA Fatigue (Push Bombing)?

Attack in which an adversary with a valid password floods the victim with MFA push prompts until the user approves one out of confusion or annoyance. It belongs to the Identity & Access category of cybersecurity.

What does MFA Fatigue (Push Bombing) mean?

Attack in which an adversary with a valid password floods the victim with MFA push prompts until the user approves one out of confusion or annoyance.

How does MFA Fatigue (Push Bombing) work?

MFA fatigue, also called push bombing, exploits push-based multi-factor authentication. After obtaining a valid password through phishing or credential stuffing, the attacker repeatedly initiates logins, triggering a stream of mobile push approvals on the victim's phone. Eventually the user taps Approve to make the noise stop, or believes the prompt is legitimate. Notable incidents include the 2022 Uber breach and the 2022 Cisco intrusion, both linked to Lapsus$ and EXOTIC LILY tradecraft. Mitigations include number matching, push verification with context, rate limiting prompts, blocking after repeated denials, and migrating to phishing-resistant FIDO2 or passkeys.

How do you defend against MFA Fatigue (Push Bombing)?

Defences for MFA Fatigue (Push Bombing) typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms