Skip to main content
Medium difficultyIdentity & Access20-30 minutes
SIEMXDR

MFA Fatigue / Push Bombing Investigation

When authentication logs show repeated MFA push notifications sent to a user in rapid succession, especially outside business hours, investigate for MFA fatigue attacks where an attacker with valid credentials repeatedly triggers push notifications hoping the user will approve one out of frustration or confusion. This technique was used in the Uber breach (September 2022) by the Lapsus$ group, where a contractor approved a push notification after receiving over 100 requests.

Overview

MFA fatigue, also called push bombing or MFA spamming, exploits the human element of multi-factor authentication. An attacker who has obtained valid credentials repeatedly triggers MFA push notifications, counting on the user eventually approving one, either by mistake, frustration, or believing it is a system error. The Lapsus$ group used this technique to breach Uber in September 2022, sending over 100 push notifications to a contractor who eventually approved one.

Cisco was similarly compromised in May 2022 using the same approach. This playbook covers how to detect MFA fatigue attempts, distinguish them from legitimate repeated login attempts, and respond before the user accidentally grants access.

When You See This

  1. 1

    Identity provider logs show 10+ MFA push requests to a single user within a short window

  2. 2

    User reports receiving unexpected MFA push notifications they did not initiate

  3. 3

    SIEM alert for MFA push notification volume anomaly outside business hours

  4. 4

    Failed MFA attempts followed by a single success from a different source IP

Investigation Steps

  1. 1

    Quantify the MFA push volume and timing

    Pull all MFA-related events for the targeted user. Count the number of push requests, their frequency, and the time window. Genuine users rarely generate more than 2-3 MFA prompts per login attempt. More than 5 in rapid succession is suspicious. More than 10 is almost certainly an attack.

    SIEM
    index=auth eventType="mfa_push" user="targeted_user" | timechart span=5m count | where count > 3
    index=okta OR index=azure_ad action="mfa_challenge" user="targeted_user" | stats count, earliest(_time) as started, latest(_time) as ended by user, src_ip | eval duration_minutes=round((ended-started)/60,1)
  2. 2

    Check if the user approved any notification

    Search for a successful MFA approval amidst the flood of requests. If the user approved one, determine the timestamp and source IP of the subsequent authenticated session. This is the critical moment; everything after approval is potentially attacker activity.

    SIEM
    index=auth user="targeted_user" (action="mfa_push_approved" OR action="mfa_push_denied" OR action="mfa_push_timeout") | table _time, action, src_ip, user_agent | sort _time

    Decision Point

    If: User approved an MFA push notification

    Yes → CRITICAL: An attacker likely has authenticated access RIGHT NOW. Immediately revoke all sessions and treat as active compromise.

    No → User held strong. Proceed to contain; reset password, notify user, block source IP.

  3. 3

    Identify the source of the authentication attempts

    Determine where the credential-based login attempts are coming from. Check the source IPs against threat intelligence and geolocation data. The attacker already has the password; trace how they obtained it (previous phishing, credential dump, infostealer malware).

    SIEMFirewall
    index=auth user="targeted_user" action=failure reason="mfa_required" | stats count by src_ip | iplocation src_ip | table src_ip, City, Country, count | sort -count
  4. 4

    Assess post-compromise activity (if push was approved)

    If the attacker gained access, immediately investigate their activities. In the Uber breach, the attacker accessed internal Slack, VPN configurations, and source code repositories within hours. Check for data access, privilege escalation, new application consent grants, and internal reconnaissance.

    SIEMXDR
    index=* user="targeted_user" src_ip="attacker_ip" | stats count by index, sourcetype, action | sort -count
  5. 5

    Contain and remediate

    Revoke all active sessions for the targeted user. Force password reset. Review and remove any unauthorized MFA device enrollments. Block the attacking source IPs. Consider migrating the user from push-based MFA to FIDO2/WebAuthn keys, which are immune to fatigue attacks. Notify the user through a verified channel about what happened.

    SIEMXDR

Common Mistakes

  1. 1

    Focusing only on whether the push was approved without investigating how the attacker obtained the password

  2. 2

    Not checking for new MFA device enrollments; sophisticated attackers enroll their own device immediately after gaining access

  3. 3

    Resetting only the password without revoking active sessions; the attacker session may persist

  4. 4

    Not recommending MFA method upgrade; push notifications are inherently vulnerable to fatigue attacks

Escalation Criteria

  • User approved an MFA push notification during a fatigue attack

  • MFA fatigue targeting executives, IT admins, or accounts with privileged access

  • Evidence of attacker activity after successful MFA bypass

Practice This Investigation

SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including mfa fatigue / push bombing investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.

12,000+ analysts trained
4.9/5 rating
Free forever tier

Frequently Asked Questions

What is MFA fatigue and how did it breach Uber?
MFA fatigue is when an attacker with valid credentials repeatedly sends MFA push notifications hoping the user approves one. In September 2022, Lapsus$ sent over 100 push notifications to an Uber contractor, then contacted them on WhatsApp pretending to be IT support. The contractor approved a notification, giving the attacker full access to Uber internal systems.
How can organizations prevent MFA fatigue attacks?
Migrate from simple push notifications to number-matching or FIDO2/WebAuthn hardware keys. Number matching requires the user to enter a code shown on the login screen, preventing blind approval. FIDO2 keys are completely immune to fatigue attacks because they require physical presence and domain verification.
How do I practice MFA fatigue investigations?
SOCSimulator includes identity-based attack scenarios featuring MFA fatigue patterns based on real Lapsus$ and Scattered Spider techniques. Practice in realistic SIEM environments. Start free forever.
Technique

Valid Accounts (T1078) — Detection Training

Adversaries may obtain and abuse credentials of existing accounts as a means of gaining initial access, persistence, pri…

Read more
Technique

Brute Force (T1110) — Detection Training

Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes…

Read more
Glossary

What is Brute Force Attack? — SOC Glossary

A brute force attack systematically tries large numbers of username and password combinations, or decryption keys, until…

Read more
Glossary

What is MFA? — SOC Glossary

Multi-Factor Authentication (MFA) requires users to provide two or more independent verification factors (something you …

Read more
Glossary

What is Lateral Movement? — SOC Glossary

Lateral movement is the attack phase where adversaries expand access from an initial foothold to additional systems, usi…

Read more
Glossary

What is SIEM? — SOC Glossary

Security Information and Event Management (SIEM) is a platform that aggregates, normalizes, and correlates log data from…

Read more
Career Path

SOC Analyst (Tier 1) Career Guide — Salary & Skills

Tier 1 SOC Analysts are the front line. You monitor alert queues, triage incoming detections, classify them as true or f…

Read more
Career Path

SOC Analyst (Tier 2) Career Guide — Salary & Skills

Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…

Read more
Comparison

SOCSimulator vs LetsDefend — Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator vs TryHackMe — Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Phishing Email Investigation — Investigation Playbook

When a phishing email is reported or detected, investigate by analyzing email headers for spoofing indicators, inspectin…

Read more
Playbook

Lateral Movement Investigation — Investigation Playbook

When alerts indicate unusual internal connections, RDP to servers from workstations, PsExec executions, or SMB access to…

Read more

We use cookies to improve your experience and measure usage. Learn more