MFA Prompt Bombing
The Latest Scams

MFA Prompt Bombing

Multi-factor authentication (MFA) provides an extra layer of security for your accounts, but it’s important to think before you click. Cybercriminals can use an attack method called MFA prompt bombing to get around MFA protections and overwhelm you with prompts via email, text message, or phone call.

For example, cybercriminals may attempt to log in to an account using your credentials. Then, they’ll request a phone call MFA verification, which is sent to the phone number you use for MFA. Cybercriminals will often request these verifications late at night when you’re asleep and unprepared. If you accept the phone call and press the button to verify your identity, you may grant the cybercriminals access to your account. Once the cybercriminals bypass your MFA, they can use your account to achieve their malicious goals.

Don’t let MFA give you a false sense of security. Follow the tips below to stay safe from MFA prompt bombing scams:

  • Never approve an MFA notification you didn’t request. If you have a shared account, verify the MFA request with the other account holder before taking action.
  • If you receive an MFA notification you didn’t request, immediately change your password for the associated account. You should also consider updating your passwords for any accounts that use the same credentials.
  • Create unique, strong passwords for each of your accounts. Without your password, it’s difficult for cybercriminals to reach the MFA step of the login process.

Stop, Look, and Think. Don’t be fooled.

Protect your network! Learn more about security awareness training for your team.

Like this article?

Share on Facebook
Share on Twitter
Share on Linkdin
Share on Pinterest

More Posts

Xmas Presents Laptop Image
Shopping

Tech Gifting Ideas

If you have made the smart move to Citynet Fiber, treat yourself and your family to some great tech gifts this year! SecurityA home security

Shop Online Image
The Latest Scams

How to Spot and Avoid Post-Shopping Scams

The joy of holiday shopping is upon us, but so are cybercriminals looking to take advantage of the season’s online frenzy. While you may have

SuperPod with WiFi 6E

Plume SuperPod WiFi 6E Specs

SuperPod with WiFi 6

Plume SuperPod WiFi 6 Specs

SuperPod

Plume SuperPod Secs