HomeCII/OTBotnet of 130,000 Devices Targets Microsoft 365 in Password-Spraying Attack

Botnet of 130,000 Devices Targets Microsoft 365 in Password-Spraying Attack

Published on

spot_img

A recent cyber attack utilizing a botnet has targeted Microsoft 365 users, putting over 130,000 compromised devices at risk. The attackers are conducting coordinated password-spraying attacks against Microsoft 365 accounts, posing a significant threat to organizations across various sectors.

Instead of traditional login methods that may trigger alerts, the attackers are using non-interactive sign-ins to avoid detection. This method bypasses Multi-Factor Authentication (MFA) checks and can go unnoticed by standard security monitoring systems. By using stolen credentials from infostealer logs, the attackers are targeting a wide range of Microsoft 365 tenants, including financial services, healthcare, government, technology firms, and educational institutions.

The attackers exploit non-interactive sign-ins, abuse Basic Authentication protocols, and coordinate their efforts through command-and-control (C2) servers. These tactics allow them to access sensitive data, disrupt services, conduct phishing campaigns, and move laterally within organizations, increasing security risks.

Security experts recommend organizations review sign-in logs, audit background service accounts, update credentials found in non-interactive sign-in logs, transition to modern authentication practices, and monitor for unusual traffic patterns. Microsoft plans to retire certain Basic Authentication protocols, emphasizing the need for organizations to strengthen their protection against such cyber attacks.

Jason Soroko, Senior Fellow at Sectigo, highlights the importance of securing non-interactive logins in Microsoft 365. He advises organizations to use alternative secure mechanisms for automated logins, enforce stricter authentication through conditional access policies, and monitor access for potential security threats.

In conclusion, the botnet-powered cyber attack targeting Microsoft 365 users underscores the importance of proactive cybersecurity measures to mitigate risks and safeguard sensitive information. By implementing the recommended security practices, organizations can enhance their defense mechanisms and protect against evolving cyber threats in today’s digital landscape.

Source link

Latest articles

Security Breach Exposes Dashboard of React2Shell Hackers to Researchers

In a troubling development within cybersecurity, attackers have become adept at leveraging vulnerabilities in...

Iran’s Cyberattacks Intensify as U.S. Identifies Targets

President Trump's Remarks on Iran Conflict Signal Potential for Resolution Amid Cybersecurity Concerns President Donald...

Gen AI Slows Down as Shadow AI Gains Traction: A CISO Concern

Going Beyond the Copilot Pilot - A CISO's Perspective As the landscape of generative AI...

Proofpoint CSO Ryan Kalember to Speak Live at RSAC 2026

On March 25, 2026, the Tech Edge forum hosted a significant fireside chat at...

More like this

Security Breach Exposes Dashboard of React2Shell Hackers to Researchers

In a troubling development within cybersecurity, attackers have become adept at leveraging vulnerabilities in...

Iran’s Cyberattacks Intensify as U.S. Identifies Targets

President Trump's Remarks on Iran Conflict Signal Potential for Resolution Amid Cybersecurity Concerns President Donald...

Gen AI Slows Down as Shadow AI Gains Traction: A CISO Concern

Going Beyond the Copilot Pilot - A CISO's Perspective As the landscape of generative AI...