Skip to main content

Botnet targets Basic Auth in Microsoft 365 password spray attacks

  • February 24, 2025
  • 1 reply
  • 8 views

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

February 24, 2025 By Bill Toulas

 

Microsoft 365

A massive botnet of over 130,000 compromised devices is conducting password-spray attacks against Microsoft 365 (M365) accounts worldwide, targeting basic authentication to evade multi-factor authentication.

According to a report by SecurityScorecard, the attackers are leveraging credentials stolen by infostealer malware to target the accounts at a large scale.

The attacks rely on non-interactive sign-ins using Basic Authentication (Basic Auth) to bypass Multi-Factor Authentication (MFA) protections and gain unauthorized access without triggering security alerts.

"Organizations relying solely on interactive sign-in monitoring are blind to these attacks. Non-interactive sign-ins, commonly used for service-to-service authentication, legacy protocols (e.g., POP, IMAP, SMTP), and automated processes, do not trigger MFA in many configurations," warns SecurityScorecard.

"Basic Authentication, still enabled in some environments, allows credentials to be transmitted in plain form, making it a prime target for attackers."

Failed login attempts by the botnet
Failed login attempts by the botnet
Source: SecurityScorecard

 

>>Full Article<<

1 reply

Ssherjj
Moderator
Forum|alt.badge.img+62
  • Moderator
  • 21888 replies
  • February 24, 2025

Wow! Thank you Microsoft! This is totally unacceptable 😤