HomeCII/OTLarge Botnet Attacks Microsoft 365 Accounts

Large Botnet Attacks Microsoft 365 Accounts

Published on

spot_img

A botnet comprising over 130,000 compromised devices has been uncovered, launching coordinated password-spraying attacks aimed at Microsoft 365 (M365) accounts. Security experts at SecurityScorecard are investigating potential ties to China-affiliated threat actors, pointing to infrastructure associated with CDS Global Cloud and UCLOUD HK, both with connections to China. The attack is utilizing command-and-control (C2) servers provided by SharkTech, a U.S.-based hosting service previously known for facilitating malicious activities.

David Mound, Threat Intelligence Researcher at SecurityScorecard, emphasized the significance of these findings, highlighting how cyber adversaries continually exploit vulnerabilities in authentication processes. He emphasized the importance of not solely relying on Multi-Factor Authentication (MFA) as a defense mechanism, stressing the need for a comprehensive understanding of non-interactive logins to bolster security measures.

Although password spraying is a familiar tactic in cyberattacks, this particular campaign stands out due to its extensive reach, stealthy execution, and exploitation of a critical security blind spot. Unlike previous incidents attributed to threat groups like Volt Typhoon from China and APT33 from Iran, this botnet employs Non-Interactive Sign-Ins to evade detection by conventional security controls. By targeting Non-Interactive Sign-Ins, which are commonly used for service-to-service authentication, the attackers can operate without triggering MFA defenses or Conditional Access Policies (CAP), even within highly secured environments.

The industries most at risk from this attack include financial services, healthcare, government and defense, technology and SaaS providers, and education and research institutions that heavily rely on Microsoft 365 for their operations. These sectors face specific threats ranging from fraud and insider breaches to espionage and intellectual property theft.

The implications of this attack are far-reaching, with potential ties to nation-state actors, bypassing of robust security measures, and a worrying trend towards similar tactics being employed in past cyber campaigns. Security teams are urged to review non-interactive sign-in logs, rotate compromised credentials, disable legacy authentication protocols, monitor for stolen credentials linked to their organization, and implement conditional access policies to limit non-interactive login attempts.

As Microsoft plans to phase out Basic Authentication completely by September 2025, the urgency for organizations to transition to more secure authentication methods has never been more critical. Failure to address these vulnerabilities promptly could lead to further exploitation on a larger scale, emphasizing the pressing need for proactive cybersecurity measures.

Source link

Latest articles

Security Breach Exposes Dashboard of React2Shell Hackers to Researchers

In a troubling development within cybersecurity, attackers have become adept at leveraging vulnerabilities in...

Iran’s Cyberattacks Intensify as U.S. Identifies Targets

President Trump's Remarks on Iran Conflict Signal Potential for Resolution Amid Cybersecurity Concerns President Donald...

Gen AI Slows Down as Shadow AI Gains Traction: A CISO Concern

Going Beyond the Copilot Pilot - A CISO's Perspective As the landscape of generative AI...

Proofpoint CSO Ryan Kalember to Speak Live at RSAC 2026

On March 25, 2026, the Tech Edge forum hosted a significant fireside chat at...

More like this

Security Breach Exposes Dashboard of React2Shell Hackers to Researchers

In a troubling development within cybersecurity, attackers have become adept at leveraging vulnerabilities in...

Iran’s Cyberattacks Intensify as U.S. Identifies Targets

President Trump's Remarks on Iran Conflict Signal Potential for Resolution Amid Cybersecurity Concerns President Donald...

Gen AI Slows Down as Shadow AI Gains Traction: A CISO Concern

Going Beyond the Copilot Pilot - A CISO's Perspective As the landscape of generative AI...