This article unpacks how Akira operationalized MFA push-spam into a global intrusion tactic, why traditional VPNs and weak identity controls continue to fuel their success and what the latest data tells us about the scale of the threat. More importantly, it outlines the counter-playbook defenders need to deploy now — from adopting phishing-resistant passkeys to treating every suspicious login prompt as a potential breach signal. In short, Akira’s rise is not just a story of one ransomware group, but a warning about how easily convenience in authentication can turn against us.
MFA was supposed to end the era of stolen-password break-ins. But Akira and its affiliates have perfected a social-engineering gambit that turns MFA into a pressure point: Push bombing (aka MFA fatigue). The move is simple and brutal — use valid (often stolen) credentials to trigger a blizzard of MFA prompts, then nudge the target via text/voice/phish until they tap ‘Approve’ just to stop the noise. MITRE now catalogs this as ‘Multi-Factor Authentication Request Generation’ and notes adversaries repeatedly trigger prompts to bombard users, counting on fatigue to win out.
Akira’s operators combine that prompt storm with old-school pretexting: ‘IT needs a quick confirm’, ‘VPN maintenance — please accept’ and so on. If the target relents once, the attackers often add their own device or create a persistent session — no malware needed. The 2022 Uber breach made the tactic infamous, and write-ups since have detailed how a contractor’s credentials plus a barrage of notifications opened the door to internal systems.
Akira’s recent surges showcase a ruthless focus on identity and remote access. In 2025, multiple investigations tied a wave of intrusions to SonicWall SSL VPN gateways. In some cases, researchers suspected a zero-day; in others, the incidents pointed to configuration weaknesses or the reuse of stolen credentials. Tech outlets summarized how even fully patched devices were implicated in pre-ransomware intrusions, and how attackers could bypass MFA by abusing OTP seeds captured in earlier compromises or misconfigurations.
The pattern is consistent with Akira’s pragmatic, playbook-driven methodology documented by government and industry advisories: Get in via VPN, pivot quickly, disable backups and extort with double- or triple-pronged data theft. A joint alert from CISA, FBI, Europol and NCSC-NL reported that as of January 1, 2024, Akira had hit over 250 organizations and extracted about $42 million — all in under a year of public activity.
Akira’s edge focus dovetails with the industry’s broader shift: Identity is the new perimeter, and VPNs, SSO and remote access stacks are the keys to the kingdom. That’s why the group’s playbook avoids noisy exploits when quiet social engineering and identity misuse will do.
If push-fatigue seems ‘too human’ to be a systemic problem, the macro data says otherwise:
Overall, these data points explain why MFA fatigue works so well: Attackers don’t need to win a zero-day lottery when the internet supplies an endless stream of valid credentials and an overworked employee who just wants the prompts to stop.
Harden MFA from ‘approve’ to ‘prove’. Push-to-approve is convenient and exploitable. Move to number matching, biometric-bound passkeys or FIDO2/WebAuthn security keys for high-risk access. Make users prove the session context instead of reflexively approving it. Microsoft, Ping and others have published concrete guardrails for reducing push-fatigue risk.
Shrink the VPN blast radius. If you still rely on a traditional VPN, gate it behind phishing-resistant factors and device posture checks. Disable generic ‘virtual office portals’ on edge gear where possible, lock access by source IP and rotate any OTP secrets stored on gateways implicated in recent campaigns. Recent coverage of the SonicWall campaigns highlights how misconfigurations and legacy controls can neutralize the value of MFA altogether.
Move identity to the least privilege by default. Assume initial access succeeds and then design the blast radius accordingly. That means, implement per-app access (zero-trust) instead of flat VPNs, just-in-time (JIT) privilege for admin tasks and consistent session-level signals (device health, location and risk score) before granting tokens. If a user caves to push-spam once, the second layer should still force re-verification with a phishing-resistant factor before sensitive moves (e.g., adding an MFA device, creating a new OAuth app and exporting data).
Instrument the human attack surface. If 68% of breaches have a human component, let users work with telemetry backing them up. Teach them to deny unexpected prompts and to report MFA-spam like they’d report a phish. Add playbook automation: If a user reports prompt-bombing, auto-lock the account, invalidate sessions and force re-enrollment with a resistant factor.
Ransomware groups have always thrived on exploiting the weakest link in security: People. While organizations have spent years fortifying their networks with MFA, groups such as Akira have flipped this very safeguard into an attack vector. By weaponizing ‘MFA fatigue’ — a relentless stream of authentication prompts designed to exhaust users into approval — Akira has shown that identity, not malware, is the modern perimeter.
The risk is amplified in complex, distributed environments such as telecom software development, where engineers, CI/CD systems and remote contractors rely on VPNs and SSO to push code and manage network functions; one coerced tap on ‘Approve’ can become unfettered access to build pipelines and service orchestration. Their playbook blends social engineering, remote access abuse and opportunistic targeting of edge devices into a ruthless strategy that has already netted tens of millions of dollars.
Detect the early tells. Akira’s intrusions often have a familiar rhythm: VPN login anomalies, a flurry of denied MFA prompts, an eventual approval and then rapid admin activity (backup tampering and domain controller probes). Treat MFA denial streaks and MFA approval after X denials as tier-1 incidents, not curiosities. Enrich with identity-provider logs, VPN telemetry and endpoint traces. In recent SonicWall-linked intrusions, some affiliates even used signed Windows drivers to sidestep EDR during lateral movement — if you see unexpected driver loads, treat them as ‘ransomware-smells-like’ events.
Patch velocity still matters. Verizon’s DBIR observed a 180% increase in breaches where vulnerability exploitation was the initial way in, largely tied to mass-exploitation events. That’s why your exposure window on edge devices and web apps is existential.
Kill the password where you can. The fastest way to nullify push-spam is to remove pushable factors. Passkeys bind credentials to the device and origin, eliminating phishing and most relay attacks. With 87% of enterprises in the U.S./UK deploying or piloting passkeys, you’re no longer an early adopter — you’re catching up.
Akira didn’t invent MFA fatigue; it just operationalized it. The group’s continuing success is a mirror held up to the industry’s habits: Passwords everywhere, push approvals without context and edge devices that double as single points of failure. The good news is that the countermoves are known and increasingly practical:
The data says the attackers will keep knocking — 7,000 times a second, to be precise. The question is whether those knocks land on a doorbell your users can be tricked into tapping or on a cryptographic lock they can’t open for an impostor, no matter how many times the phone buzzes.
Recent Articles By Author