The Credential Stuffing + MFA Fatigue Hybrid Attack: Why Your IAM Penetration Tests Are Missing Modern Breach Patterns
The Hybrid Threat Nobody's Testing For
Your penetration testers ran an MFA fatigue attack simulation. Your credential stuffing defenses held. Yet attackers still got in.
Why? Because modern threat actors aren't choosing between credential stuffing or MFA fatigue attacks anymore—they're chaining them together in a hybrid assault that traditional identity compromise detection systems weren't designed to catch.
In 2025, we've watched this attack pattern succeed against enterprises running best-in-class security infrastructure. Companies with strong password managers, hardware security keys, and SOC teams still fell victim because their authentication attack simulation exercises didn't model how these tactics work in tandem.
This isn't theoretical. It's happening now. And your IAM penetration tests probably aren't catching it.
How the Hybrid Attack Works: The Three-Stage Assault
Stage 1: Credential Stuffing at Scale
The attack begins conventionally. Threat actors leverage publicly available credential databases from past breaches—there are billions of username/password pairs circulating on dark forums right now. They execute credential stuffing campaigns against your organization's authentication endpoints, using botnets and residential proxies to evade basic rate-limiting.
Most organizations catch this at layer one:
- Behavioral analysis flags unusual login attempts
- Rate limiting blocks rapid-fire authentication requests
- Geolocation anomaly detection triggers MFA challenges
But here's what defenders miss: attackers don't expect all attempts to succeed. They're running high-volume, low-success campaigns specifically to:
- Map which email addresses are valid in your organization
- Identify which users have already enabled MFA (the real targets)
- Trigger MFA challenges en masse across your user base
Stage 2: The MFA Fatigue Trap
Once attackers know who has MFA enabled, they pivot to MFA fatigue attacks—a social engineering technique where automated push notifications flood a target's authenticator app or phone with MFA verification requests.
The psychology is simple: after 15-20 rapid-fire prompts, even security-conscious users either:
- Accidentally approve one out of frustration
- Disable notifications temporarily
- Use a weaker authentication method they've previously set up
This is where traditional MFA fatigue attack testing falls short. Most penetration tests simulate the attack against a single target or small group in a controlled lab environment. Real-world campaigns are:
- Distributed across multiple authentication endpoints
- Timed to coincide with high-activity periods (mornings, after holidays)
- Paired with reconnaissance showing which users have approval-based MFA (not TOTP)
- Escalated gradually to avoid triggering account lockouts
Stage 3: Persistence Through Trust Exploitation
Once an attacker gains initial access via MFA fatigue, they don't immediately trigger alerts. Instead, they:
- Register a new trusted device
- Create allowlist entries for their IP address
- Set up credential forwarding or session tokens
- Establish persistent access before defenders realize identity compromise detection systems should be alarmed
Why Standard Penetration Tests Miss This Pattern
The Testing Blind Spot
Traditional authentication attack simulation exercises test individual attack vectors in isolation:
Test 1: Can we brute-force passwords? → Yes/No
Test 2: Can we bypass MFA? → Yes/No
Test 3: Can we social engineer a user? → Yes/No
But they rarely test the orchestration question:
Test 4: If we chain credential stuffing + MFA fatigue +
trusted device registration + session hijacking,
what's the mean time to undetected persistence?
This gap exists because:
-
Scope Constraints: Most pentests are time-boxed and budget-constrained. Running a week-long distributed MFA fatigue attack testing campaign costs more and requires more planning.
-
Detection Sensitivity: Security teams fear that realistic MFA fatigue simulations will:
- Overwhelm user support
- Trigger false-positive alerts
- Disrupt business operations
So they ask testers to dial it back—missing the exact conditions under which real attacks succeed.
-
Visibility Gaps: Most organizations lack cross-functional visibility into:
- Which users have credential stuffing defense mechanisms enabled
- How many pending MFA pushes trigger account lockouts
- Whether "trusted device" allowlists are being exploited
- Correlation between high-volume failed logins and subsequent successful access
The Regulatory Blind Spot
New regulations like the SEC's cybersecurity rules (effective 2024) and NIS2 Directive (EU) require "regular penetration testing" but don't mandate testing for hybrid attack patterns. Organizations comply by running annual assessments that test known vectors—then assume they're protected against novel combinations.
They're not.
How to Test for Hybrid Credential + MFA Attacks
1. Map Your MFA Architecture
Before testing, inventory:
- Which users have approval-based MFA (push notifications) vs. time-based OTP?
- Which users have backup codes or recovery methods?
- How many concurrent MFA challenges trigger account lockouts?
- How quickly does your SOC get alerted to anomalous MFA activity?
2. Simulate Realistic Credential Stuffing Scale
Instead of testing 100 login attempts, test 10,000+ distributed across:
- Multiple authentication endpoints
- Different user populations (employees, contractors, partners)
- Realistic time-of-day patterns
- Multiple source IPs (residential proxies if your lab permits)
Measure:
- How many valid email addresses are identified?
- How long before your identity compromise detection systems trigger alerts?
- Which MFA users are targeted by subsequent attacks?
3. Execute Distributed MFA Fatigue Campaigns
With your testers' MFA-enabled accounts, execute:
- 15-20 push notifications in 5-minute windows
- Escalating patterns (10 pushes → 5-minute pause → 15 pushes)
- Coordinated timing with high-traffic periods
- Measurement of which users approve vs. deny vs. disable notifications
For each approval, measure:
- What persistence mechanism did attackers establish?
- How long until it was detected?
- What authentication attack simulation metrics would have caught it?
4. Implement Detection Rules for the Hybrid Pattern
Ask your SOC to build alerts for:
Alert: High-volume failed logins from residential IPs
+ MFA approvals from unusual geographies
+ New device registrations within 10 minutes
+ Session activity from non-typical hours
This is the pattern—not just individual events.
5. Consider Continuous Automated Testing
Platforms like TurboPentest are specifically designed to simulate hybrid attack patterns continuously, rather than once per year. They can:
- Run distributed MFA fatigue attack testing across your entire user base
- Measure credential stuffing defense effectiveness in real time
- Identify which users are most vulnerable to identity compromise via automated authentication simulation
- Provide trending data on whether your IAM penetration testing maturity is improving
Continuous testing catches hybrid patterns that annual assessments miss.
Closing the Detection Gap
The organizations that avoided breaches in 2025 weren't the ones with perfect MFA—they were the ones running hybrid attack simulations and tuning their detection rules accordingly.
Your next MFA fatigue attack testing exercise should assume:
- Attackers have your employee list
- They know who has MFA enabled
- They'll distribute the assault over hours or days
- They're patient enough to exploit trust mechanisms
If your authentication attack simulation doesn't model this, your penetration test isn't measuring what matters.
Start with mapping your MFA architecture. Then build a test plan that chains credential stuffing, MFA fatigue, and persistence together. Measure the results. Iterate.
That's how you close the gap modern threat actors are exploiting right now.