I've been thinking a lot about exhaustion lately. Not the kind that comes from long hours or complex projects—the kind that attackers are deliberately weaponizing against us. And it's working.
The Attack That Exploits Human Nature
MFA fatigue attacks are a clever tactic in cybersecurity: an adversary who recognizes that the weakest part of any security system isn't the cryptography or the firewall. It's the person at 11 PM who just wants the notifications to stop.
Here's how it works: an attacker steals your credentials—probably through phishing, or from one of the countless breaches exposing nearly every American’s personal information over the past two years. They try to log in. Your phone buzzes with an MFA push notification. You decline it. Another notification. You decline again. Then another. And another. Midnight arrives. You're exhausted. The notifications keep coming.
Eventually, a large percentage of people just approve the request to stop it. The psychology is simple but devastating. We've trained users to respond to prompts. We've built muscle memory around tapping "Approve." And attackers have learned how to weaponize that conditioning. This leads me to a sidebar that matters more than it might seem.
Kevin Mitnick passed away in July 2023 from cancer. For those who don't know, Mitnick was once the most wanted computer criminal in the US—a social engineering pioneer who served five years in federal prison. What's worth remembering isn't just his criminal past but his transformation into one of the most respected white-hat security consultants.
One of my book's reviewers and a close friend, Andrew Starvitz, met Kevin Mitnick. He had a metal lockpick set as a business card—perfectly fitting for someone who spent his career showing that most security is just theater if you understand human nature. Andrew Starvitz also met Frank Abagnale Jr. at a Novell NetWare event, which dates us quite a bit. Abagnale's story—immortalized in "Catch Me If You Can”—follows a similar arc: extraordinary criminal ability redirected toward protecting systems he once exploited. These transformations remind us that understanding the attacker’s mindset isn't just of academic interest. It's critical. The best defenders often think like the people trying to break in.
Speaking of transformations and justice, Ross Ulbricht—founder of the Silk Road marketplace—received a full and unconditional pardon from President Trump in January 2025 after serving more than a decade of his double life sentence, plus forty years. Whatever your views on the case, Ulbricht's release reflects ongoing national discussions about proportional sentencing in tech crimes.
The breach that affected everyone
But here's a development that should keep you awake at night: the National Public Data breach of 2024.
NPD was a data broker—a company that collects, combines, and sells your personal data without your permission and largely without your knowledge. A cybercriminal known as "USDoD" compromised their databases starting in late 2023, exposing about 2.9 billion records and affecting over 272 million people. Names. Addresses. Social Security numbers. Phone numbers. Emails.
The company didn't publicly confirm the breach until August 2024, months after the data was already circulating on the dark web. The owner of Jerico Pictures, Inc.—which does business as National Public Data—is Salvatore Verini, Jr., a former Florida law enforcement officer. He was trusted with hundreds of millions of Americans' most sensitive personal info, stored it on insecure systems, and faced no real criminal consequences when it was stolen and leaked.
Let me be clear: in the past two years, almost every American’s personal information has been compromised through no fault of their own. Our government has been painfully slow at protecting consumers. Data brokers operate with little regulation, peddling our data with no accountability and no real way to opt out. You can check if your data was exposed at npd.pentester.com. Spoiler: it probably was.
The way forward: Passkeys
So, what can you do? Passkeys are the biggest leap forward in authentication security in decades. Passkeys replace passwords entirely with a public-private key pair linked to your device. When you verify your identity, your phone or computer uses biometric verification—your fingerprint, face, or PIN—to unlock a private key. This private key never leaves your device. No password to steal. No credentials to automate attacking.
The security is impressive: passkeys are resistant to phishing because they’re cryptographically tied to specific websites. They eliminate the threat of credential reuse. And they're more convenient because you use familiar authentication methods to unlock your device.
Major platforms now support passkeys. Google, Apple, Microsoft, and most big services have adopted them. Adoption is still early, but this is where authentication is headed.
The conclusion
MFA fatigue attacks succeed because our security systems rely on human vigilance, which ignores human limits. Data brokers have built an industry to gather and sell the info that enables these attacks, while laws lag far behind the threat. And breaches keep happening.
My recommended defense: turn on passkeys everywhere possible. Use number-matching MFA where passkeys aren't available. Never approve an auth request you didn't start—if you keep getting notifications, it’s an attacker, not a glitch. And assume your info is already compromised, because statistically, it probably is. We’re in an environment where identity theft isn't just a risk; it's a reality we must navigate. The real question isn't if your data is out there but how well you can limit the damage.
---------------
What's your experience with passkey adoption? Have you seen MFA fatigue attacks in your organization? Are the tools we're using keeping up with the threats?
Would love to hear your thoughts. Drop me a line at dr.samkm@protonmail.ch



