MFA Fatigue / Push Bombing Investigation
When authentication logs show repeated MFA push notifications sent to a user in rapid succession, especially outside business hours, investigate for MFA fatigue attacks where an attacker with valid credentials repeatedly triggers push notifications hoping the user will approve one out of frustration or confusion. This technique was used in the Uber breach (September 2022) by the Lapsus$ group, where a contractor approved a push notification after receiving over 100 requests.
Overview
MFA fatigue, also called push bombing or MFA spamming, exploits the human element of multi-factor authentication. An attacker who has obtained valid credentials repeatedly triggers MFA push notifications, counting on the user eventually approving one, either by mistake, frustration, or believing it is a system error. The Lapsus$ group used this technique to breach Uber in September 2022, sending over 100 push notifications to a contractor who eventually approved one.
Cisco was similarly compromised in May 2022 using the same approach. This playbook covers how to detect MFA fatigue attempts, distinguish them from legitimate repeated login attempts, and respond before the user accidentally grants access.
When You See This
- 1
Identity provider logs show 10+ MFA push requests to a single user within a short window
- 2
User reports receiving unexpected MFA push notifications they did not initiate
- 3
SIEM alert for MFA push notification volume anomaly outside business hours
- 4
Failed MFA attempts followed by a single success from a different source IP
Investigation Steps
- 1
Quantify the MFA push volume and timing
Pull all MFA-related events for the targeted user. Count the number of push requests, their frequency, and the time window. Genuine users rarely generate more than 2-3 MFA prompts per login attempt. More than 5 in rapid succession is suspicious. More than 10 is almost certainly an attack.
SIEMindex=auth eventType="mfa_push" user="targeted_user" | timechart span=5m count | where count > 3
index=okta OR index=azure_ad action="mfa_challenge" user="targeted_user" | stats count, earliest(_time) as started, latest(_time) as ended by user, src_ip | eval duration_minutes=round((ended-started)/60,1)
- 2
Check if the user approved any notification
Search for a successful MFA approval amidst the flood of requests. If the user approved one, determine the timestamp and source IP of the subsequent authenticated session. This is the critical moment; everything after approval is potentially attacker activity.
SIEMindex=auth user="targeted_user" (action="mfa_push_approved" OR action="mfa_push_denied" OR action="mfa_push_timeout") | table _time, action, src_ip, user_agent | sort _time
Decision Point
If: User approved an MFA push notification
Yes → CRITICAL: An attacker likely has authenticated access RIGHT NOW. Immediately revoke all sessions and treat as active compromise.
No → User held strong. Proceed to contain; reset password, notify user, block source IP.
- 3
Identify the source of the authentication attempts
Determine where the credential-based login attempts are coming from. Check the source IPs against threat intelligence and geolocation data. The attacker already has the password; trace how they obtained it (previous phishing, credential dump, infostealer malware).
SIEMFirewallindex=auth user="targeted_user" action=failure reason="mfa_required" | stats count by src_ip | iplocation src_ip | table src_ip, City, Country, count | sort -count
- 4
Assess post-compromise activity (if push was approved)
If the attacker gained access, immediately investigate their activities. In the Uber breach, the attacker accessed internal Slack, VPN configurations, and source code repositories within hours. Check for data access, privilege escalation, new application consent grants, and internal reconnaissance.
SIEMXDRindex=* user="targeted_user" src_ip="attacker_ip" | stats count by index, sourcetype, action | sort -count
- 5
Contain and remediate
Revoke all active sessions for the targeted user. Force password reset. Review and remove any unauthorized MFA device enrollments. Block the attacking source IPs. Consider migrating the user from push-based MFA to FIDO2/WebAuthn keys, which are immune to fatigue attacks. Notify the user through a verified channel about what happened.
SIEMXDR
Common Mistakes
- 1
Focusing only on whether the push was approved without investigating how the attacker obtained the password
- 2
Not checking for new MFA device enrollments; sophisticated attackers enroll their own device immediately after gaining access
- 3
Resetting only the password without revoking active sessions; the attacker session may persist
- 4
Not recommending MFA method upgrade; push notifications are inherently vulnerable to fatigue attacks
Escalation Criteria
User approved an MFA push notification during a fatigue attack
MFA fatigue targeting executives, IT admins, or accounts with privileged access
Evidence of attacker activity after successful MFA bypass
Practice This Investigation
SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including mfa fatigue / push bombing investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.
Frequently Asked Questions
- What is MFA fatigue and how did it breach Uber?
- MFA fatigue is when an attacker with valid credentials repeatedly sends MFA push notifications hoping the user approves one. In September 2022, Lapsus$ sent over 100 push notifications to an Uber contractor, then contacted them on WhatsApp pretending to be IT support. The contractor approved a notification, giving the attacker full access to Uber internal systems.
- How can organizations prevent MFA fatigue attacks?
- Migrate from simple push notifications to number-matching or FIDO2/WebAuthn hardware keys. Number matching requires the user to enter a code shown on the login screen, preventing blind approval. FIDO2 keys are completely immune to fatigue attacks because they require physical presence and domain verification.
- How do I practice MFA fatigue investigations?
- SOCSimulator includes identity-based attack scenarios featuring MFA fatigue patterns based on real Lapsus$ and Scattered Spider techniques. Practice in realistic SIEM environments. Start free forever.
Related SOC Training Resources
Valid Accounts (T1078) — Detection Training
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining initial access, persistence, pri…
Read more TechniqueBrute Force (T1110) — Detection Training
Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes…
Read more GlossaryWhat is Brute Force Attack? — SOC Glossary
A brute force attack systematically tries large numbers of username and password combinations, or decryption keys, until…
Read more GlossaryWhat is MFA? — SOC Glossary
Multi-Factor Authentication (MFA) requires users to provide two or more independent verification factors (something you …
Read more GlossaryWhat is Lateral Movement? — SOC Glossary
Lateral movement is the attack phase where adversaries expand access from an initial foothold to additional systems, usi…
Read more GlossaryWhat is SIEM? — SOC Glossary
Security Information and Event Management (SIEM) is a platform that aggregates, normalizes, and correlates log data from…
Read more Career PathSOC Analyst (Tier 1) Career Guide — Salary & Skills
Tier 1 SOC Analysts are the front line. You monitor alert queues, triage incoming detections, classify them as true or f…
Read more Career PathSOC Analyst (Tier 2) Career Guide — Salary & Skills
Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…
Read more ComparisonSOCSimulator vs LetsDefend — Comparison
SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…
Read more ComparisonSOCSimulator vs TryHackMe — Comparison
SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…
Read more PlaybookPhishing Email Investigation — Investigation Playbook
When a phishing email is reported or detected, investigate by analyzing email headers for spoofing indicators, inspectin…
Read more PlaybookLateral Movement Investigation — Investigation Playbook
When alerts indicate unusual internal connections, RDP to servers from workstations, PsExec executions, or SMB access to…
Read more