Botnet of 130,000 Devices Launches Password-Spraying Attack on Microsoft 365

A significant cyber threat has emerged, posing serious risks to Microsoft 365 users. Researchers from SecurityScorecard have uncovered that a botnet comprising over 130,000 compromised devices is launching coordinated password-spraying attacks targeting Microsoft 365 accounts. This development highlights the evolving tactics of cybercriminals aiming to exploit vulnerabilities within widely used platforms.

The attackers have shifted from traditional login tactics that typically trigger alerts from security systems due to repeated failed sign-in attempts. Instead, they are leveraging non-interactive sign-ins for their operations. This method, primarily used for automated processes and background services, circumvents standard multi-factor authentication (MFA) checks, allowing malicious activities to slip past the radar of conventional security monitoring solutions. The campaign targets a diverse array of Microsoft 365 tenants, affecting sectors such as finance, healthcare, government, technology, and education, making the threat widespread and alarming.

The modus operandi of the attackers includes systematic credential theft, utilizing stolen credentials sourced from infostealer logs. As they engage in these attacks, the significance of understanding the tactics employed is critical. The MITRE ATT&CK framework provides a useful lens through which to view these activities, with tactics such as Initial Access and Credential Dumping likely playing roles in the exploitation of compromised accounts.

Compromised accounts can enable unauthorized access to sensitive information, including emails and documents, which in turn can precipitate severe operational disruptions. Repeated unauthorized login attempts may lead to account lockouts, cutting off legitimate access and hindering organizational productivity. Moreover, once attackers gain control of accounts, they can misuse them for phishing campaigns or extend their infiltration within an organization, aggravating the situation. Monitoring efforts focused solely on interactive log-in events may overlook these silent threats.

Security professionals are urged to enhance their vigilance by thoroughly reviewing sign-in logs, prioritizing non-interactive log entries, and scrutinizing suspicious login attempts. Organizations are advised to conduct audits of service accounts to identify those utilizing Basic Authentication and to update any exposed credentials found in logs of non-interactive sign-ins. Furthermore, transitioning from legacy protocols to modern authentication strategies that fully embrace MFA can significantly bolster security defenses.

As Microsoft plans to phase out certain Basic Authentication protocols later this year, organizations have a timely opportunity to reinforce their defenses. The integration of stronger authentication measures, such as conditional access policies, and the careful restriction of legacy protocols is recommended but must be implemented judiciously to avoid disrupting legitimate automated processes.

Insights from cybersecurity experts indicate that non-interactive logins, commonly deployed through automated tasks and API integrations, represent a substantial portion of overall authentication events. Consequently, organizations must fortify this facet of their security posture by employing alternative secure mechanisms, such as certificates or managed identities, and instituting continuous monitoring protocols.

In summary, the recent surge in sophisticated attacks on Microsoft 365 underlines the necessity for organizations to adapt their security strategies. By understanding the tactics employed in these cyber assaults and taking proactive measures, business owners can better safeguard their critical assets against an increasingly capable adversary landscape.

Source