-
- Home
>
-
- Resources
>
-
- White Paper
Deep-Dive Analysis of Multifactor Authentication Fatigue Attacks
White Paper
There are many tactics cybercriminals use to defeat MFA security measures, but one successful method is a tactic known as MFA Fatigue. In this white paper, we cover what MFA Fatigue is and how it functions, share examples of attacks, and provide guidance for detection and mitigation.
Threat actors may attempt to bypass MFA mechanisms and gain access to accounts,using the MFA Fatigue tactic. This method of authentication attack is also known as Prompt Bombing. This occurs when an attacker sends push notifications to a victim’s MFA device. Eventually the victim approves one of the push notifications,which allows the attacker to log in.
This white paper covers:
- How cyberattacks have evolved from simple credential theft into MFA bypass attempts
- Explain MFA fatigue and how it functions
- Share examples of high-profile attacks,
- Provide guidance for detection and mitigation using a security information and event management (SIEM) platform
Download the white paper to learn more.
Get the White Paper: Deep-Dive Analysis of Multifactor Authentication Fatigue Attacks
Complete the form below and submit to download this resource.