Threat IntelHIGH

Iran-Linked Hackers Launch Password Spray Campaign Against Microsoft 365

Featured image for Iran-Linked Hackers Launch Password Spray Campaign Against Microsoft 365
#Microsoft 365#Iran-linked#password spray#Check Point#cyber attack

Original Reporting

CSCyber Security News·Tushar Subhra Dutta

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT Group
Aliases
Attribution
Target Sectors
Target Regions
Active Since
Campaign Name
Primary TTPs
Tools Used
MITRE ATT&CK
Motivation
🎯

Basically, hackers are trying to guess passwords to break into Microsoft accounts in the Middle East.

Quick Summary

Iran-linked hackers have launched a password spray campaign against Microsoft 365 tenants in the Middle East. Over 300 organizations in Israel and 25 in the UAE are affected. This attack highlights the risks of weak passwords in cloud environments. Organizations must enhance their security measures to mitigate such threats.

What Happened

A new password spray campaign has emerged, targeting Microsoft 365 tenants in the Middle East, particularly focusing on Israel and the United Arab Emirates. This campaign is linked to a threat actor believed to be operating from Iran. Instead of deploying malware, these attackers are exploiting weak passwords and exposed accounts to gain unauthorized access.

The attacks unfolded in three distinct waves on March 3, 13, and 23, 2026, affecting over 300 organizations in Israel and more than 25 in the UAE. Smaller numbers of targets were also identified in Europe, the United States, the United Kingdom, and Saudi Arabia. The targeted entities included government agencies, municipalities, energy companies, and private businesses.

Who's Affected

The primary victims of this campaign are organizations within Israel and the UAE, with a notable focus on Israeli municipalities. The attack’s design suggests a possible connection to broader geopolitical objectives, including support for military operations.

How It Works

Unlike traditional brute-force attacks that target individual accounts, password spraying attempts to access multiple accounts using a few common passwords. This method reduces the likelihood of detection, as it generates less login noise. The attackers utilized numerous source IP addresses, making it difficult for defenders to block their access effectively.

Once valid credentials were identified, the attackers shifted their login attempts to commercial VPN services, which helped them bypass geo-restrictions and minimize alerts related to foreign access. This tactic allowed them to infiltrate sensitive cloud data without raising alarms typically associated with malware.

Tactics & Techniques

The attack cycle can be broken down into three stages:

  1. Scan: The attackers used Tor exit nodes and disguised their requests to look like legitimate traffic.
  2. Infiltrate: Upon finding valid credentials, they accessed sensitive information through legitimate accounts.
  3. Exfiltrate: The attackers then moved into email and cloud storage, gaining access to personal and organizational data.

Defensive Measures

Organizations must adopt several measures to protect against such attacks:

  • Monitor sign-in logs for unusual patterns, such as multiple failed attempts across different accounts.
  • Implement location-based access controls to restrict logins from suspicious geographic locations.
  • Enforce tenant-wide multi-factor authentication (MFA) to add an extra layer of security.
  • Improve password hygiene by encouraging the use of complex, unique passwords.
  • Enable audit logs for post-compromise investigations.

These steps are essential, as a single weak password can grant adversaries lasting access to organizational resources. With many services and users relying on Microsoft 365, identity monitoring is as crucial as endpoint security in today's cyber landscape.

🔍 How to Check If You're Affected

  1. 1.Review sign-in logs for multiple failed login attempts from the same IP address.
  2. 2.Set up alerts for unusual login activity from foreign locations.
  3. 3.Enforce multi-factor authentication across all accounts.

🏢 Impacted Sectors

GovernmentEnergyTechnology

Pro Insight

🔒 Pro insight: The use of VPNs and Tor for obfuscation indicates a sophisticated approach, suggesting advanced planning and operational security by the threat actor.

Sources

Original Report

CSCyber Security News· Tushar Subhra Dutta
Read Original

Related Pings

HIGHThreat Intel

Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks

Storm-1175 is exploiting vulnerabilities in Medusa ransomware attacks, targeting healthcare and other sectors. Organizations need to enhance their defenses to combat this threat.

Infosecurity Magazine·
HIGHThreat Intel

Evolving Russian Cyberattacks - Insights into New Tactics

Russian cyberattacks against Ukraine are evolving, with new tactics like social engineering being employed. Despite this, improved defenses have led to a decline in incidents, marking a significant shift.

SC Media·
HIGHThreat Intel

Multi-OS Cyberattacks - How SOCs Address Critical Risks

Multi-OS cyberattacks are on the rise, exploiting fragmented SOC workflows. This article reveals three steps SOCs can implement to enhance threat detection and response. Don't let attackers gain the upper hand—learn how to streamline your operations now.

The Hacker News·
HIGHThreat Intel

DPRK Cyber Program - Modular Malware Strategy Explained

North Korea's cyber program has evolved to utilize modular malware and GitHub for command-and-control operations, complicating detection and increasing risks for global targets.

Cyber Security News·
HIGHThreat Intel

North Korean IT Worker Unmasked During Job Interview Technique

A viral video reveals a technique to identify North Korean IT operatives by asking them to insult Kim Jong Un, highlighting infiltration risks and the challenges posed by remote hiring.

Cyber Security News·
HIGHThreat Intel

Surge in App Exploits - AI Accelerates Cyber-Attacks

IBM's latest report reveals a shocking 44% rise in cyber-attacks on public apps, fueled by AI. Both large and small businesses are at risk. It's a call to action for stronger security measures.

Infosecurity Magazine·