Push Spam • Social Engineering • Akira Ransomware
Throughout 2025, the Akira ransomware group weaponized MFA push-spam to bypass multi-factor authentication protections.
MFA Fatigue (also called "Push Bombing" or "MFA Spam") exploits the human weakness, not the technology. Attackers who already have valid credentials (from phishing, password reuse, breaches) repeatedly trigger MFA push notifications to annoy users into approving.
Via phishing, credential stuffing, or data breach
User's phone receives 50-100 push notifications in 10 minutes
"Maybe I accidentally triggered this?" or "Make it stop!"
Attacker gains access to corporate network
50+ notifications overwhelm decision-making. Users stop thinking critically and just want to "make it stop."
"Did I accidentally trigger this by trying to log in? Maybe I should approve to fix my mistake."
Notifications during work, meetings, or sleep disrupt productivity. Users approve just to continue their day.
Some attackers call the user pretending to be IT support: "We need you to approve these MFA prompts for a security update."
Limit MFA push attempts per user per time period.
Instead of "Approve/Deny", show a number in the login screen that user must type into their phone.
"Approve this login?" [Yes] [No]
"Enter the number: 73" [___]
User must see the login screen to get the number → can't approve blindly
Show user details about the login attempt (location, device, time).
Use ML to detect anomalous patterns.
One push every second