

Imagine it’s the end of a long workday, and just as you’re heading out, your phone starts flooding with urgent notifications for a password change — “Allow” or “Don’t Allow.” You haven’t requested a change, yet the prompts persist relentlessly and block the use of your phone. Faced with frustration, what would you do? This scenario illustrates a sophisticated cyberattack known as MFA Bombing.
MFA Bombing, or Multi-Factor Authentication Bombing, is a tactic where attackers repeatedly send MFA verification prompts to a victim’s device. The goal is to fatigue the user into mistakenly granting access by pressing “Allow,” often just to stop the incessant notifications. The close placement of the “Allow” and “Don’t Allow” buttons exacerbates the risk, as does the extension of these notifications to devices like smartwatches, where a wrong tap is even more likely.
A Real-World Example: A case reported by Krebs on Security highlighted a user who received over 30 MFA requests in quick succession. Days later, the attack escalated with a deceptive phone call from someone posing as Apple support, a classic move in social engineering. This incident underscores not just the persistence of the MFA Bombing but also its combination with other tactics to exploit user fatigue and steal credentials.