One need not be an elite criminal to carry out an MFA prompt bombing attack. Like most
social engineering scams, most of its success relies on opportunistic timing; catching the target at the most vulnerable moment. Usually at night, when the user is tired and less alert, and with the help of a script that continually attempts to log into an account when run, threat actors are able to prompt the user's device continually, until, in frustration, the victim verifies the prompt.