Push-bombing: The newest hacking method to rely on human error.

by Jon Lober | NOC Technology

What is push-bombing and how can you stop it?

Cybersecurity is a game of cat and mouse that plays out in a continuous loop. As soon as hackers discover a new way to penetrate an organization, cybersecurity experts quickly close the hole. The same thing happens in reverse. As security technology advances, hackers invent clever new ways to bypass these obstacles. Push-bombing is just the latest move in that game. 

 

Through the years, networks have become increasingly secure through a variety of technological means. Back doors into systems are not quite as common as they once were. As a result, hackers now frequently turn to the front door by going after login credentials. They do not need to break through the window if they can find the key to simply open the front door. 

 

To open the door, hackers use various methods (like phishing) to obtain login credentials. The goal is to gain access to business data as a valid user to be able to glean information to launch further attacks or steal directly. This problem has become quite severe. Between 2019 and 2021, account takeover (ATO) rose by 307%

 

To combat this problem, many organizations and individuals have turned to multi-factor authentication (MFA), which stops attackers that have gained access to usernames and passwords. MFA is very effective at protecting cloud accounts and has been for many years. 

 

However, once again, determined hackers have invented a new way to try to bypass this security tool—push-bombing. Like phishing and business email compromise, this hacking tool relies on human error and inattention instead of technological wizardry. 

 

How Does Push-Bombing Work?

To sign onto an MFA-enable account, a user enters their username and password and then typically receive a code or authorization prompt of some type. The MFA code or approval request will usually come through some type of “push” message through one of the following: 

  • SMS/text 
  • Email 
  • A device popup 
  • A dedicated MFA app notification 

That notification is a normal part of the MFA login. 

 

Push-bombing begins once a hacker has already stolen a user’s credentials, which may have been obtained through phishing or from a large data breach password dump. 

 

Taking advantage of the push notification process, hackers attempt to log in many times, sending the legitimate user several push notifications one after another. 

 

Many people question the receipt of an unexpected code that they didn’t request, but when someone is bombarded with these, it can be easy to mistakenly click “approve.” Push-bombing is a form of social engineering attack designed to: 

  • Confuse the user 
  • Wear the user down 
  • Trick the user into approving the MFA request to give the hacker access 

How to Combat Push-Bombing at Your Organization

1. Educate Employees

Since push-bombing is a relatively new type of hacking method, when a user experiences an attack, they may be confused and unprepared. With a little education beforehand, they will be better prepared to defend themselves. 

 

Educate your employees. Explain what push-bombing is and how it works. Provide them with training on what to do if they receive MFA notifications that they did not request. 

 

You should also give your staff a way to report these attacks. Your IT security team can alert other users and take steps to secure everyone’s login credentials. 

 

2. Reduce Business App “Sprawl"

On average, an employee uses an alarming 36 different cloud-based services per day. The more logins someone has to use, the greater the risk of a stolen password. 

 

Take a look at how many applications your company uses and look for ways to reduce app “sprawl” by consolidating tools. Platforms like Microsoft 365 and Google Workspace offer many tools behind one login. Streamlining your cloud environment improves security and productivity. 

 

3. Adopt Phishing-Resistant MFA Solutions

You can thwart push-bombing attacks altogether by moving to a more advanced form of MFA. Phishing-resistant MFA uses a device passkey or physical security key for authentication with no push notification to approve. This solution is more complex to set up, but is more secure than text or app-based MFA. 

 

4. Enforce Strong Password Policies

For hackers to send several push-notifications, they must first have the user’s login. Strong, enforced password policies reduces the chance that a password will get breached. You can read more about password security in this post, but to get started: 

  • Use at least one upper and one lower-case letter 
  • Use a combination of letters, numbers, and symbols 
  • Do not use personal information to create a password 
  • Store passwords securely 
  • Do not reuse passwords across several accounts 


5. Implement an Advanced Identity Management Solution

Advanced identity management solutions combine all logins through a single sign-on solution. Users, have just one login and MFA prompt to manage, rather than several. 

 

Additionally, businesses can use identity management solutions to implement contextual login polici which enable a higher level of security. Using these settings, a system could automatically block login attempts outside of a designated geographic area, block logins during certain times, or prevent access when other contextual factors are not met. 


Missouri Sheltered Workshops can empower human potential through AI
By Jon Lober April 24, 2025
Embracing the potential of both AI and humans
Tech upgrades that will boost employee safety in sheltered workshops
By Jon Lober April 15, 2025
At NOC Technology, we've worked with Missouri sheltered workshops for over seven years, and I've witnessed firsthand how the right technological implementations can transform sheltered workshop environments. Today, I'd like to share some insights on leveraging modern technology to create safer workspaces while maintaining the dignity and privacy of all participants. The Unique Safety Challenges of Sheltered Workshops Sheltered workshops provide valuable employment opportunities for individuals with disabilities, but they also present unique safety considerations. Workers may have varying levels of physical mobility, cognitive processing, and sensory perception—all of which can impact how they respond to traditional safety measures. Additionally, the production environments often involve machinery, tools, and materials that require careful monitoring and management. The Role of Smart Technology in Safety Advancements in smart technology provide real-time safety monitoring, immediate alerts for potential hazards, and improved emergency response times. Let’s explore some key technologies and their benefits in sheltered workshop environments. Personalized Alert Systems Traditional emergency alarms can be overwhelming for individuals with sensory sensitivities. Smart alert systems can deliver personalized notifications through: Vibrating wristbands that alert workers without auditory overload Visual notification systems with customizable colors and patterns Tablet-based communication for workers who benefit from visual cues Location-specific alerts that only notify those in affected areas We recently implemented a multi-modal alert system at a workshop in central Missouri that reduced anxiety-related incidents during emergency drills by 65% . Environmental Monitoring Maintaining optimal environmental conditions is crucial for both safety and productivity: Temperature and humidity sensors that automatically adjust HVAC systems Air quality monitors that detect potentially harmful particulates Noise level monitoring to prevent sensory overload Automated ventilation systems that activate when chemical levels exceed thresholds These systems not only protect workers but also provide documented compliance with OSHA regulations. Enhanced Supervision through Smart Cameras Security cameras have evolved beyond simple surveillance. Modern systems can: Detect unusual patterns that might indicate a worker in distress Monitor restricted areas without constant staff presence Identify when machinery is being used incorrectly Alert supervisors to potential safety hazards Important note: All camera systems should be implemented with strict privacy protocols and transparent policies. Workers and guardians should be fully informed about what is being monitored and why. In many cases, audio cannot be recorded, and the camera system must be configured to meet this requirement. Wearable Safety Technology Wearable devices offer personalized safety monitoring without stigmatization: Fall detection pendants that automatically alert staff Location tracking that helps locate workers in emergency situations Biometric monitoring for workers with health conditions Proximity sensors that prevent accidental entry into hazardous areas These wearables can be designed to look like standard ID badges or watches, preserving dignity while enhancing safety. Implementation Best Practices Successfully integrating smart technology into sheltered workshops requires careful planning: Involve all stakeholders: Workers, guardians, and staff should participate in selecting and implementing new technologies. Prioritize simplicity: Choose solutions that require minimal training and maintenance. Phase in gradually: Introduce new technologies in stages to allow everyone time to adapt. Balance automation with human oversight: Technology should supplement, not replace, trained staff. Respect privacy: Collect only essential data and maintain strong security protocols.
Could your sheltered workshop benefit from grant funding for new technology?
By Jon Lober April 7, 2025
As a sheltered workshop, you play a crucial role in providing meaningful employment opportunities for individuals with disabilities. However, like any organization, securing funding for technology upgrades can be a challenge. While investing in the right tools can improve efficiency, security, and overall productivity—that’s all only if you can afford the tools in the first place.
More Articles