Why MFA Prompts Are the New Hacker Trick (and What to Do About It)

Multi-Factor Authentication (MFA) is meant to protect your business, but attackers have started using it against you. MFA fatigue is when hackers flood your phone or device with login prompts, hoping you’ll hit “approve” just to get some peace. It works because people are busy, distracted, and used to clicking “yes” without thinking. This tactic is spreading fast, and SMEs are an easy target.

What MFA fatigue actually is

MFA fatigue kicks in when someone has already stolen a password. Instead of guessing more, they just keep trying to log in. Each attempt triggers an approval message on the victim’s phone. If they get fed up and accept one by mistake, the attacker gets in. That’s it.

It’s not about breaking your systems. It’s about relying on the fact that humans make snap decisions, especially when under pressure.

Why it works so well

These attacks rely on habits and timing. If someone gets five or ten prompts during a meeting or while commuting, they might hit accept without thinking. That’s the psychology behind it—overload, repetition, and the assumption that MFA is always safe. Many staff don’t know that one wrong tap can open the door to everything: emails, files, client records, even finance systems.

Real incidents you should know about

This isn’t just theory. In 2022, Uber was breached when an employee approved a login after being bombarded with pop-ups. The hacker got access to internal systems and sent messages through the company’s internal chat.

Microsoft faced the same issue the same year. The LAPSUS$ group used MFA fatigue to access employee accounts. They didn’t need to steal anything complicated. They just needed someone to get tired and say yes.

Sources like Microsoft, Keepnet Labs, and NinjaOne all back this up. It’s a known tactic that keeps working.

Does this only happen to Microsoft users?

No. Google Workspace, Okta, Duo and most major platforms that use push notifications are exposed to this method. But if you use Microsoft properly, you’ve got more ways to prepare to face it. Most SMEs don’t change the defaults, and that’s the risk.

In our experience, businesses using Microsoft can cut the risk with features like number matching, conditional access, and stronger login settings. You just need someone to set it up properly and explain what staff should do if they get suspicious prompts.

What your team should do

Tell your staff to stop, think, and speak up. If they get login prompts they didn’t expect, they shouldn’t approve them. It’s not about trusting the system—it’s about trusting their instinct. If something seems wrong, they should flag it. That hesitation could stop an attack.

As a business owner or manager, review how your MFA is set up. Talk to your IT provider about safer options. Don’t leave your team guessing.

MFA Prompt Safety Checklist

You can send this to staff or pin it up in shared spaces.

✅ Ask yourself first:

  • Did I just try to log in?

  • Is the location correct?

  • Does the time make sense?

🚫 If not sure:

  • Don’t approve

  • Take a screenshot

  • Contact your IT support (Clearsky clients: ring us straight away)

MFA fatigue is about timing, repetition, and human error—not broken tech. Microsoft tools can help to lower the chances of your business becoming prey to it, but only if you’re using them the right way. If you want to check how your setup is performing, we can help.

Further reading: Multifactor authentication

18th June 2025

Why MFA Prompts Are the New Hacker Trick (and What to Do About It)

MFA fatigue attacks trick business users into approving fake login prompts. We want to tell you how the attacks work, why they’re effective, and what SMEs can do to reduce the risk of MFA fatigue being used as a point of vulnerability.

Learn more
29th May 2025

What are great businesses learning from the M&S cyber attack?

Not just a cyber attack, an M&S cyber attack. What forward-thinking businesses can learn from the recent high-profile hacking attacks.

Learn more
7th May 2025

How Spearphishing Emails Trick Smart People

Spearphishing scams don’t just fool careless people—they target the top players at busy businesses. Whilst you can never anticipate every personalised email, you can learn how they work and how you and your team can spot them.

Learn more