The attack pattern in one paragraph
MFA fatigue (also called push-bombing or MFA-prompt-bombing) is a phishing bypass technique that begins with the attacker already holding a valid username and password for the target. The attacker logs into the identity provider, which triggers a push notification to the victim's authenticator app asking Approve or Deny. The victim denies. The attacker logs in again. Another push. The victim denies again. The attacker logs in fifty more times across an hour, frequently in the middle of the night, until the victim either approves a prompt out of frustration, taps the wrong button on a phone they thought was locked, or assumes the prompts are a system glitch and approves to make them stop. The moment the victim taps Approve, the attacker is inside.
The technique exploits the structural weakness of simple push-style MFA, which presents the user with only two options (Approve or Deny) and provides no contextual information about who is requesting authentication or from where. The victim has no way to distinguish a legitimate prompt from an attacker-driven prompt. The defender response, well-established by mid-2023 and shipped as default in Microsoft Authenticator and most major MFA platforms by 2024, is number-matching: the prompt requires the victim to read a number from the device requesting authentication and enter it on the MFA prompt. The attacker, who is not co-located with the victim, cannot provide the correct number.[CISA MFA guidance 2023 + Microsoft Identity Threat Defense 2024]