Skip to Content

EID-EXP-008- MFA Fatigue Simulation vs Identity Risk Detection

Category: Authentication

Platform: Microsoft Entra ID

Description: Repeated MFA push requests against a valid user account

Result: MFA repetition alone did not consistently trigger elevated identity risk

Risk: 🟠 Medium 

Tenant Conditions

The experiment was performed in a dedicated Microsoft 365 lab tenant.

ComponentConfiguration
TenantMicrosoft 365 E5
Identity PlatformMicrosoft Entra ID
Risk DetectionIdentity Protection
Access ControlConditional Access
Authentication MethodMicrosoft Authenticator push
Test UserStandard user with MFA registered

Scenario Tested

A repeated MFA push attack was simulated against a valid user account.

Attack sequence:

  1. Attacker signs in using valid credentials.

  2. MFA push notification is generated.

  3. User denies or ignores the request.

  4. Attacker repeats authentication attempts.

Test parameters:

  • 10–15 authentication attempts

  • Multiple attempts within a short time window

  • Same user account repeatedly targeted

Additional variations were introduced:

  • alternate IP address (VPN)

  • browser/device attribute change

Evidence-01 — Repeated MFA Challenges in Sign-In Logs

Authentication logs show repeated sign-in attempts for the same user within a short time window.

Evidence observed:

  • multiple authentication attempts

  • repeated MFA challenges

  • authentication requirement = MFA

Screenshot reference: Sign-In Logs – Multiple MFA challenges

Evidence of MFA attack simulation

Evidence-02 — Identity Protection Risk Detection

Identity Protection telemetry shows risk signals generated when additional anomalies are introduced.

Evidence observed:

  • unfamiliar sign-in properties

  • unusual IP location

  • elevated sign-in risk

Screenshot reference: Risky Sign-In Detection

Evidence of MFA attack simulation


Evidence-03 — Conditional Access Policy Evaluation

Conditional Access logs confirm policy evaluation during elevated sign-in risk events.

Evidence observed:

  • risk-based policy evaluation

  • MFA enforcement

  • Login blocked remediation when user risk escalates

Screenshot reference: Conditional Access Result

Evidence of MFA attack simulation

Evidence of MFA attack simulation

Evidence-04 — User Risk Remediation Trigger

When identity risk escalated during the experiment, remediation policies were triggered.

Observed behavior:

  • user marked as High risk

  • password reset requirement enforced

  • access remediation required before further sign-in attempts

This confirms automated remediation functionality when user risk policies are enabled.

Evidence of MFA attack simulation

Evidence Summary


008-01

Tenant Validation

Informational
008-02

Sign-in Logs

High

008-03

Sign-in Risk Detection

High

008-04

Conditional Access Policy Evaluation

High

008-05

User Risk Remediation Trigger

High


Security Takeaway

MFA fatigue attacks highlight a limitation of push-based authentication.

MFA alone does not reliably prevent account compromise.

Effective protection requires:

  • identity risk detection

  • risk-based Conditional Access policies

  • automated remediation workflows

Without these controls, MFA functions primarily as a notification mechanism rather than an automated defense.


Related Analysis & Fix Guidance

- Technical deep dive: MFA Fatigue Attacks in Microsoft 365: Why Risk-Based Conditional Access Is Non-Negotiable 

- MSP risk & business impact: MFA Fatigue Attacks: The Overlooked Risk Increasing Business Costs

- Video walkthrough: MFA Fatigue Explained: How Hackers Trick Users Into Approving Attacks