Security researchers at SecurityScorecard have accused Chinese hackers of carrying out massive, coordinated password spraying attacks on Microsoft 365 accounts. Password spraying is typically blocked by security systems, but this campaign targets non-interactive logins used to authenticate between services, which do not always generate security alerts.

Image source: pexels.com

Password spraying is a hacking technique that involves using a list of commonly used passwords to launch a mass attack on many accounts. Such attacks are often successful because many users protect their accounts with simple passwords that are easy to guess, such as “123456,” “password,” or “qwerty123.” The 2024 world record holder for passwords, “123456,” was found in over 3 million accounts in a study by NordPass. It takes less than a second to crack such a password.

SecurityScorecard cited the attackers’ use of infrastructure associated with CDS Global Cloud and UCLOUD HK, both organizations with operational ties to China, in their allegations. “These findings from our STRIKE Threat Intelligence team confirm that attackers continue to find and exploit gaps in authentication processes,” said SecurityScorecard security researcher David Mound. “Organizations cannot afford to assume that MFA (multi-factor authentication) alone is sufficient protection. Understanding the nuances of non-interactive logins is critical to closing these gaps.”

While password spraying is a well-known technique, this campaign is unique in its scale, stealth, and exploitation of critical security blind spots. Unlike previous attacks associated with Solt Typhoon (China) and APT33 (Iran), this botnet uses non-interactive logins to evade detection and blocking by traditional security measures. These logins are used to authenticate between services and do not always generate security alerts. This allows attackers to operate without enabling MFA or conditional access policies (CAP), even in highly secure environments.

Image source: SecurityScorecard

This attack has implications for many industries, but organizations that rely heavily on Microsoft 365 for email, document storage, and collaboration may be particularly at risk. To avoid becoming a victim of a cyberattack, you should:

  • Check non-interactive login logs for unauthorized access attempts.
  • Change credentials for all accounts with recent failed login attempts.
  • Disable legacy authentication protocols.
  • Track stolen credentials associated with their organization in the information thieves’ logs.
  • Implement conditional access policies that restrict non-interactive login attempts.

With Microsoft set to completely phase out Basic Authentication by September 2025, these attacks highlight the urgency of moving to more secure authentication methods before they become even more widespread.

admin

Share
Published by
admin

Recent Posts

Nissan Leaf EV to Become NACS-Ported Compact Crossover in Third Generation

Nissan Leaf can rightfully be considered a long-liver of the electric car market, since the…

3 days ago

OpenAI expects to more than triple its revenue this year and then double it next year.

OpenAI, the market leader in generative artificial intelligence systems, remains nominally a startup, its financial…

3 days ago

OpenAI Decides to Hold 4o Image Generation Launch for Free Users

OpenAI has been forced to delay the release of ChatGPT's built-in image generator for free…

3 days ago

1440p and 240Hz for just $200: Xiaomi updates the 27-inch Redmi G27Q gaming monitor

Xiaomi continues to update its Redmi G27Q gaming monitor every year. The model was first…

3 days ago

Beware, Android is shutting down: OS development will cease to be public, but there is no reason to panic

Android device makers can significantly customize the look and feel of the operating system, but…

3 days ago

Fake GeForce RTX 4090s with RTX 3090 chips have started popping up in China — craftsmen are even changing the GPU markings

In China, scammers have started selling GeForce RTX 3090 graphics cards, passing them off as…

3 days ago