Your Two-Step Safety Net Under Attack
- JULY 30TH, 2025
- 2min read
Introduction
You likely use Multi-Factor Authentication (MFA) – that extra step beyond your password, like a code from your phone or a fingerprint scan. MFA is a powerful security layer, making your accounts much harder to hack. But cybercriminals have found a new way to bypass it, exploiting not a technical flaw, but your patience. This emerging threat is called MFA Fatigue.
This isn’t theoretical. High-profile incidents, such as the 2022 Uber data breach, saw attackers bombard employees with repeated MFA push notifications. Some employees, likely annoyed or confused, eventually approved a request they didn’t initiate, giving the attackers access to their systems: Multi-Factor Authentication Fatigue Key Factor in Uber Breach. This tactic proves that even your best defenses can be compromised by persistent manipulation.
Protecting Yourself: Don’t Let Annoyance Lead to Compromise
Your active vigilance is your best defense against MFA Fatigue:
- Never Approve Unexpected MFA Requests: If you didn’t just try to log in, do not approve any MFA push notification.
- Verify It Is You: Some MFA systems use “number matching” (showing a number on screen for you to type into your device). Always check this carefully and confirm you initiated the request.
- Report Suspicious Activity: If you receive a barrage of unexpected MFA prompts, report it to your IT department (for work accounts) or the service provider (for personal accounts) immediately.
- Look for Context: Only approve MFA requests when you are actively logging into an application or service yourself.
- Consider Stronger MFA: If available, opt for hardware security keys (like YubiKey) or authenticator apps (e.g., Google Authenticator, Microsoft Authenticator) over simple push notifications, as these are harder to “bomb.”
Conclusion: Your Click, Their Access – Choose Wisely
MFA is critical for cybersecurity, but MFA Fatigue proves that even the strongest locks can be picked if the user is tricked. Always verify, never blindly approve. Your security depends on your watchful click.
Explore more CIL Advisories
Review Bombing Attacks and Extortion
IntroductionMalicious actors use "review-bombing", a coordinated flood of fake, one-star reviews as an initial step for extortion. This high volume…
NOVEMBER 26TH, 2025
Read More
Synthetic Phishing: AI-Enabled Insider Impersonation
IntroductionThreat actors increasingly use artificial intelligence (AI) to impersonate trusted individuals such as executives, employees, or suppliers within organisations. These…
NOVEMBER 24TH, 2025
Read More
The Silent Security Threat: Data Hoarding
IntroductionThe greatest risk to your organization may be the sheer volume of data we hold, a practice known as Data…
NOVEMBER 19TH, 2025
Read MoreNever miss a CIL Security Advisory
Stay informed with the latest security updates and insights from CIL.