MFA Fatigue Attacks in 2026: Why Number Matching Is Not Enough Anymore
Push notification MFA with number matching was the defense against 2022-2024 MFA fatigue attacks. Adversaries adapted. Here is what is working in 2026. And why FIDO2 and session-binding are now the floor, not the ceiling.
Founder of Valtik Studios. Pentester. Based in Connecticut, serving US mid-market.
# MFA fatigue attacks in 2026: why number matching isn't enough anymore
If your security team's answer to MFA fatigue is "we enabled number matching," stop reading this and forward it to the rest of your team.
Number matching was the 2023-2024 fix. Instead of tapping "Approve" on a push notification, the user had to read a number off the sign-in screen and type it into the authenticator. Broke the muscle-memory attack pattern that Scattered Spider used to compromise Uber in 2022. Good defense. Saved a lot of organizations.
Attackers adapted. April 2026 incidents we're tracking show MFA fatigue variants specifically engineered to defeat number matching. Adversary-in-the-middle proxies that intercept and relay. Help desk pretext calls that get number-match values read over the phone. "Helpful" SMS claiming the number needs to be read out to an IT engineer working a ticket.
Number matching raised the floor. The floor is now the ceiling. Here's what's actually failing, and what modern MFA posture looks like.
What's failing now
Social-engineering the user to cooperate
The 2026 pattern: adversary calls the help desk OR the user directly, impersonates IT. And tells the user "we're rolling out a security upgrade, you'll see a prompt in a second, the code is 47. Please approve it."
Number matching provides no defense here. The user reads the number, enters it, the adversary is authenticated. Social engineering scripts are getting better. Deepfake voice layered over the call makes this worse.
Observed in: multiple breaches at Fortune 1000 companies Q4 2025 through Q1 2026. Victim count is underreported because the attack looks like a successful legitimate MFA approval in logs.
Token theft via malware
Infostealers evolved. Redline, Raccoon, Lumma, and newer variants harvest session cookies and MFA session tokens from browser storage. When the attacker has a valid session token, MFA is already complete. No MFA prompt fires because no new authentication is happening.
Observed: 16 billion credentials leaked in 2025 included millions of session tokens, not passwords. Organizations with password-only protection via MFA-at-login but no continuous session re-verification get bypassed here.
Adversary-in-the-middle phishing
Evilginx, Muraena, and newer phishing kit iterations proxy authentication in real time. User gets phished, enters credentials at attacker's site, attacker forwards to real site, real site prompts for MFA (including number matching), user provides the code, attacker completes authentication and captures the session cookie.
Number matching doesn't save you. The user is performing MFA correctly. Against the attacker's proxy. Session cookie captured. Attacker now has post-MFA access.
Observed: Scattered Spider documented using this. Microsoft 365 Defender and Okta ThreatInsight both track indicators of this attack pattern in active campaigns.
Help desk-assisted MFA reset
Adversary calls help desk impersonating target, claims lost phone, requests MFA reset. Help desk resets. Adversary enrolls a new factor on attacker-controlled device. Now adversary has a valid post-MFA session.
MGM and Caesars both fell to this in 2023. Recovery flow has been the top help-desk-enabled attack vector since.
What's working
FIDO2 / WebAuthn hardware keys for privileged access
Physical security keys (YubiKey, Google Titan, Feitian) with FIDO2 can't be phished by adversary-in-the-middle proxies. The cryptographic challenge binds to the legitimate site's origin. User can't approve authentication at a phishing site because the key won't respond to the phishing origin.
Limitation: users lose keys, break keys, forget keys. Need a backup factor or multiple keys. Recovery flow becomes the weak point. See below.
Deployment recommendation: FIDO2 enforced for all privileged users (admins, finance, exec). Backup key per user. Backup key stored in a locked drawer at the user's desk, not the HR office.
Passkeys for workforce authentication
Passkey (FIDO2 credential stored on device) offers similar anti-phishing properties to hardware keys without the physical token. iOS, Android, Windows Hello, and macOS Touch ID all support passkeys. The authentication happens device-local with biometric verification.
Limitation: device-bound. Lose the device, need recovery. Enterprise enrollment requires MDM to ensure the passkey lives in a secure enclave and can't be exfiltrated.
Deployment: Okta FastPass, Microsoft Authenticator with passkey mode, Google Workspace passkey mode. Coverage is broad now. If your identity provider doesn't support passkey, switch providers.
Device-bound session tokens
Beyond MFA at login, session cookies bound to device identity. If the cookie is stolen and replayed from a different device fingerprint, session is rejected. Microsoft has Continuous Access Evaluation, Google has Workspace context-aware access, Okta has session bindings via device trust.
Limitation: requires device trust integration (MDM + EDR feeding device posture into identity decisions). Significant deployment work for most enterprises.
Continuous re-verification
For sensitive actions (wire transfer authorization, privileged admin, key rotation), require fresh authentication. A three-hour-old session isn't good enough. User has to authenticate again with FIDO2 to complete the action.
Identity platforms support this via authentication policies. Okta's Adaptive MFA, Entra Conditional Access with session re-authentication, Ping's step-up. Most enterprises haven't deployed step-up on the specific sensitive actions.
Phishing-resistant MFA everywhere, no exceptions
The exception always becomes the attack path. If the legacy ERP system still uses SMS MFA and everything else is FIDO2, the ERP is how you get compromised. Every service needs phishing-resistant MFA. Every exception needs a documented risk acceptance and an expiration date.
Help desk procedure hardening
Help desk can't reset MFA without verifying identity through a channel that can't be spoofed. Options:
- Video call with on-camera visual verification against HR photo
- Physical office appearance with ID
- Verification via manager the help desk staff personally knows (not a name lookup)
- For executives, additional verification via Board-level secretary
Operationally expensive. The cost of the prevented MGM / Caesars scenario is higher. Prioritize this for executive, engineer, and privileged-access accounts.
The 2026 MFA policy baseline
For a company over 100 employees, the minimum defensible MFA policy is:
- FIDO2 or passkey required for all privileged accounts (admins, finance, executives, engineers).
- FIDO2 or passkey required for all remote access (no VPN without phishing-resistant).
- Phishing-resistant MFA for all production system access.
- Step-up authentication for sensitive actions (wire, admin tasks, key rotation).
- Help desk MFA reset disabled for privileged accounts. Only self-service via pre-enrolled backup key or in-person verification.
- Continuous session evaluation integrated with EDR device posture.
- Session tokens bound to device fingerprint.
- No SMS MFA anywhere. Not even as backup.
More strict than most 2025 policies. It's less strict than what zero-trust-mature organizations have deployed. The security questionnaires enterprise buyers send in 2026 now include several of these as explicit requirements.
Cost considerations
- FIDO2 hardware keys: $30-$70 per user for primary, same for backup, ~10% annual replacement rate. For 200 employees, $15-25K first year, $2-3K annual replacement.
- Device-bound sessions: requires MDM + EDR integration with IdP. Implementation project, typically $50-150K consulting cost depending on environment.
- Passkey enrollment: free if your IdP supports it (most do now). Change management cost to deploy to workforce.
- Help desk process change: training plus additional verification infrastructure. Operational cost of slower help desk response times, which can be meaningful.
- Step-up authentication: available in existing IdP subscriptions. Configuration work only.
For a typical enterprise, total MFA program upgrade is $75-250K depending on size. Compared to a breach cost averaging $4.88 million (IBM Cost of a Data Breach Report 2024), the ROI is severe.
What we test during engagements
Our authentication posture reviews include:
- Identity provider configuration review (Okta, Entra ID, Ping, etc.)
- MFA factor audit across all enrolled users
- Phishing-resistant MFA coverage percentage calculation
- Help desk reset flow testing (including social engineering attempt)
- Session token binding validation
- Step-up authentication configuration on sensitive actions
- Legacy authentication protocol audit (basic auth, NTLM, SMB1 still enabled anywhere?)
- API key and service account MFA posture
- Evidence production for SOC 2, NYDFS 500, PCI DSS 4.0 Requirement 8.3
Most engagements surface 3-7 material gaps. The most common: "we've MFA" but 15-30% of users are on SMS or TOTP, at least one critical app accepts password-only, help desk reset is permissive.
Resources
- CISA Phishing-Resistant MFA guide
- FIDO Alliance deployment guidance
- Microsoft authentication method deprecation roadmap
- Okta's Adaptive MFA configuration documentation
- NIST SP 800-63-3 Digital Identity Guidelines
Hire Valtik Studios
Authentication is the single most important security control for 2026. Our MFA posture reviews produce a specific, prioritized list of changes that move you from "we've MFA enabled" to "phishing-resistant everywhere with proper session management." If you're running Okta, Entra ID, Ping, or Google Workspace identity and haven't had it reviewed in 12 months, the gaps will surprise you.
Reach us at valtikstudios.com.
Want us to check your Authentication setup?
Our scanner detects this exact misconfiguration. plus dozens more across 38 platforms. Free website check available, no commitment required.
