Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsMFA Prompt Bombing (Noun) [Word Notes]
MFA Prompt Bombing (Noun) [Word Notes]
Cybersecurity

Hacking Humans

MFA Prompt Bombing (Noun) [Word Notes]

Hacking Humans
•January 13, 2026•6 min
0
Hacking Humans•Jan 13, 2026

Key Takeaways

  • •Attackers flood MFA prompts until user approves inadvertently.
  • •Prompt bombing exploits user annoyance and fatigue.
  • •Lapsus and Cozy Bear have used this technique operationally.
  • •Mitigation includes MFA rate limiting and user education.

Pulse Analysis

MFA prompt bombing is a social‑engineering attack that overwhelms a user’s secondary authentication channel with a torrent of approval requests. After an adversary obtains a valid username and password, they repeatedly trigger login attempts, each generating a push notification or SMS to the victim’s device. The constant barrage creates irritation, and many users eventually approve the request simply to stop the noise. This technique bypasses the intended security of multi‑factor authentication by exploiting human fatigue rather than technical flaws, turning a protective measure into an entry point.

The method has been confirmed in real‑world campaigns. Members of the Lapsus ransomware group openly discussed unlimited MFA calls, claiming that a single accepted prompt grants access to enrollment portals and additional devices. Russian APT28, also known as Cozy Bear, has employed prompt bombing in sophisticated espionage operations, demonstrating its appeal to nation‑state actors. Even popular culture reflects the concept; the 1992 film *Sneakers* dramatizes a similar “push‑button” scenario, highlighting how attackers can manipulate routine security checks. These examples show that prompt bombing is not theoretical—it is actively compromising enterprises worldwide.

Defending against MFA prompt bombing requires both technical controls and user awareness. Organizations should enforce rate‑limiting on authentication attempts, require explicit justification for multiple prompts, and monitor for anomalous login patterns. Deploying hardware‑based or biometric second factors reduces reliance on push notifications that can be spammed. Regular training reminds employees to treat unexpected MFA requests as potential attacks, especially outside normal working hours. Integrating these measures into a broader zero‑trust framework ensures that compromised credentials cannot be leveraged without additional verification. As MFA adoption grows, addressing prompt fatigue is essential to preserve the integrity of multi‑factor defenses.

Episode Description

Please enjoy this encore of Word Notes.

Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mfa-prompt-bombing⁠

Audio reference link: movieclips. “⁠Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.⁠” YouTube, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos.

Show Notes

0

Comments

Want to join the conversation?

Loading comments...