• Latest
  • All
  • How To
Microsoft 365

Hackers Use Massive Botnet to Exploit Microsoft 365 Security Loophole

February 25, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
DHgate Tablet Cases deals
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025
smartphones-2024

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

May 7, 2025
GTA 6 Trailer 2

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

May 7, 2025
YouTube Premium Duo

YouTube Now Lets Two People Share a Premium Plan

May 6, 2025
Infinix GT20 Pro

Infinix GT 20 Pro Review: You Don’t Need to Overspend on Gaming Power Anymore

May 6, 2025
Emerald PostPay

Safaricom Transitions Customers to New Emerald PostPay Plans

May 6, 2025
Intrusion Detection System

Android 16 Will Let You Track Suspicious Activity on Your Phone

May 6, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Hackers Use Massive Botnet to Exploit Microsoft 365 Security Loophole

Naftary Thitu by Naftary Thitu
February 25, 2025
in News
Reading Time: 4 mins read
281
0
Microsoft 365

Imagine waking up to find your Microsoft 365 account compromised. Not because you had a weak password, but because cybercriminals found a way to bypass multi-factor authentication (MFA) entirely. That’s what is happening.

A massive botnet, made up of over 130,000 compromised devices, is running large-scale password spraying attacks against Microsoft 365 users worldwide. By exploiting a security blind spot in non-interactive sign-ins and basic authentication, these attackers are slipping past security defenses undetected.

How Are Hackers Breaking Into Microsoft 365 Accounts?

This is not your typical brute-force attack. Instead of guessing passwords randomly, the attackers are using stolen login credentials from infostealer malware logs. They then attempt logins using non-interactive sign-ins, which don’t require user input and don’t often trigger MFA prompts.

Non-interactive sign-ins are commonly used for:

  1. Service-to-service authentication.
  2. Legacy email protocols (POP, IMAP, SMTP).
  3. Automated processes.

Since these sign-ins don’t always enforce MFA, hackers can use basic authentication to get in; no extra verification is needed. Despite Microsoft working to phase out Basic Auth, many organizations still have it enabled, giving attackers an easy backdoor.

Cybersecurity researchers suspect that this campaign is linked to a Chinese-affiliated threat group, though investigations are still ongoing.

These criminals aren’t just using stolen credentials; they’ve built an entire attack infrastructure to cover their tracks:

  • Password spraying: Systematically trying stolen login details across thousands of accounts.
    Proxy-based evasion: Distributing attacks across different IP addresses to avoid detection.
  • Command-and-Control (C2) servers: Six servers, all based in the US, are directing these attacks.
    Massive botnet: Over 130,000 hijacked devices are communicating with these C2 servers.

A four-hour snapshot of botnet activity showed these devices aggressively trying to break into accounts worldwide, without triggering security alerts.

If your organization relies only on interactive sign-in monitoring, this attack will go unnoticed. A successful breach can lead to:

  • Stolen sensitive data: Emails, documents, and collaboration tools compromised.
  • Account lockouts: Repeated login attempts causing downtime and frustration.
  • Internal phishing: Attackers using breached accounts to launch secondary attacks.
  • Bypassing MFA: No verification prompt means no extra layer of protection.
  • Reduced visibility: Many security tools don’t track non-interactive sign-ins.

How to Protect Your Microsoft 365 Accounts

Hackers are exploiting gaps in the authentication security, but you don’t have to be their next victim. Here’s how to defend against this attack:

  1. Disable basic authentication: Microsoft is retiring it soon, but don’t wait; turn it off now.
    Monitor Non-Interactive Sign-Ins: Set up alerts for unusual logins and activity.
  2. Enforce MFA Everywhere: Even for service accounts and automated processes.
    Use Privileged Access Management (PAM): Limit service account permissions and enforce credential rotation.
  3. Strengthen Conditional Access Policies: Restrict logins based on location, risk level, and device type.
    Educate Security Teams: Awareness is key. Make sure your IT team knows about this attack.

Darren Guccione, CEO of Keeper Security, warns that this attack is a wake-up call for businesses still relying on outdated authentication methods.

“Attackers are bypassing MFA by abusing non-interactive sign-ins and stolen credentials. Securing authentication pathways is critical; just having MFA isn’t enough.”

Microsoft plans to fully retire Basic Authentication by 2025, but until then, this botnet will continue to exploit organizations that haven’t updated their security settings.

Tags: MalwareMicrosoftMicrosoft 365Phishing
SendShare156Tweet98
Naftary Thitu

Naftary Thitu

Tech enthusiast and ICT guru by trade, I've swapped debugging code for decoding tech trends. When I’m not wrangling with cybersecurity conundrums or geeking out over the latest gadgets, I’m busy turning techie mumbo jumbo into engaging, often hilarious, articles.

Related Posts

xbox-series-s

Xbox Prices Jump Worldwide as Microsoft Hikes Costs Across the Board

May 6, 2025
Microsoft hotpatching

Microsoft Introduces Paid Hotpatching to Windows Server 2025

April 28, 2025
windows 11 microsoft

How to Install Windows 11 on an Unsupported Windows 10 PC

April 23, 2025
phishing emails

Hackers Now Sending Phishing Emails From “[email protected]”

April 22, 2025
Hospitals Targeted by Stealthy New Malware Called ResolverRAT

Hospitals Targeted by Stealthy New Malware Called ResolverRAT

April 15, 2025
Microsoft

Microsoft Fires Two Engineers Who Protested AI Deals with Israel

April 8, 2025

Latest

Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

How to Handle Private Number Calls in Kenya

May 8, 2025

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

5 Leading Grant Management Software for Nonprofits

More News

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

YouTube Now Lets Two People Share a Premium Plan

Infinix GT 20 Pro Review: You Don’t Need to Overspend on Gaming Power Anymore

Safaricom Transitions Customers to New Emerald PostPay Plans

Android 16 Will Let You Track Suspicious Activity on Your Phone

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.