• Latest
  • All
  • How To
Microsoft 365

Hackers Use Massive Botnet to Exploit Microsoft 365 Security Loophole

February 25, 2025
kenya-parliament

Parliament Invites Public Feedback on Virtual Asset Bill 2025

May 30, 2025
ConnectedAfrica2025(Day4)-meta-foondamate

Connected Africa 2025 Day 4: FoondaMate and Meta Team Up to Bring AI to Classrooms

May 29, 2025
google-veo-3

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

May 29, 2025
iOS 26

Apple Plans Big Rename for iOS and macOS at WWDC 2025

May 29, 2025
DHgate Tablet Cases deals
University student fined for defamatory Facebook posts

University Student Fined KES 7.5 Million for Defamatory Facebook Posts

May 29, 2025
AI Africa policies database

New Platform Brings All African AI Policies Under One Database

May 28, 2025
POATE 2025

Kenya’s Tourism Sector Grows as Travel Gets Easier Across East Africa

May 28, 2025
sodium-ion battery

Researchers Develop Sodium-Ion Battery That Charges to 80% in 6 Minutes

May 27, 2025
TV Gambling Ads

Regulator Fines Stations Using Religious Shows to Push Gambling

May 27, 2025
Connected Africa Summit 2025

Connected Africa 2025 Day 2: Focus on Digital Inclusion & Cybersecurity

May 27, 2025
whatsapp chatbots

iPad Users May Finally Get a Native WhatsApp App

May 28, 2025
Connected Africa Summit

Connected Africa Summit Calls for Unified Tech Vision

May 28, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Hackers Use Massive Botnet to Exploit Microsoft 365 Security Loophole

Naftary Thitu by Naftary Thitu
February 25, 2025
in News
Reading Time: 4 mins read
281
0
Microsoft 365

Imagine waking up to find your Microsoft 365 account compromised. Not because you had a weak password, but because cybercriminals found a way to bypass multi-factor authentication (MFA) entirely. That’s what is happening.

A massive botnet, made up of over 130,000 compromised devices, is running large-scale password spraying attacks against Microsoft 365 users worldwide. By exploiting a security blind spot in non-interactive sign-ins and basic authentication, these attackers are slipping past security defenses undetected.

How Are Hackers Breaking Into Microsoft 365 Accounts?

This is not your typical brute-force attack. Instead of guessing passwords randomly, the attackers are using stolen login credentials from infostealer malware logs. They then attempt logins using non-interactive sign-ins, which don’t require user input and don’t often trigger MFA prompts.

Non-interactive sign-ins are commonly used for:

  1. Service-to-service authentication.
  2. Legacy email protocols (POP, IMAP, SMTP).
  3. Automated processes.

Since these sign-ins don’t always enforce MFA, hackers can use basic authentication to get in; no extra verification is needed. Despite Microsoft working to phase out Basic Auth, many organizations still have it enabled, giving attackers an easy backdoor.

Cybersecurity researchers suspect that this campaign is linked to a Chinese-affiliated threat group, though investigations are still ongoing.

These criminals aren’t just using stolen credentials; they’ve built an entire attack infrastructure to cover their tracks:

  • Password spraying: Systematically trying stolen login details across thousands of accounts.
    Proxy-based evasion: Distributing attacks across different IP addresses to avoid detection.
  • Command-and-Control (C2) servers: Six servers, all based in the US, are directing these attacks.
    Massive botnet: Over 130,000 hijacked devices are communicating with these C2 servers.

A four-hour snapshot of botnet activity showed these devices aggressively trying to break into accounts worldwide, without triggering security alerts.

If your organization relies only on interactive sign-in monitoring, this attack will go unnoticed. A successful breach can lead to:

  • Stolen sensitive data: Emails, documents, and collaboration tools compromised.
  • Account lockouts: Repeated login attempts causing downtime and frustration.
  • Internal phishing: Attackers using breached accounts to launch secondary attacks.
  • Bypassing MFA: No verification prompt means no extra layer of protection.
  • Reduced visibility: Many security tools don’t track non-interactive sign-ins.

How to Protect Your Microsoft 365 Accounts

Hackers are exploiting gaps in the authentication security, but you don’t have to be their next victim. Here’s how to defend against this attack:

  1. Disable basic authentication: Microsoft is retiring it soon, but don’t wait; turn it off now.
    Monitor Non-Interactive Sign-Ins: Set up alerts for unusual logins and activity.
  2. Enforce MFA Everywhere: Even for service accounts and automated processes.
    Use Privileged Access Management (PAM): Limit service account permissions and enforce credential rotation.
  3. Strengthen Conditional Access Policies: Restrict logins based on location, risk level, and device type.
    Educate Security Teams: Awareness is key. Make sure your IT team knows about this attack.

Darren Guccione, CEO of Keeper Security, warns that this attack is a wake-up call for businesses still relying on outdated authentication methods.

“Attackers are bypassing MFA by abusing non-interactive sign-ins and stolen credentials. Securing authentication pathways is critical; just having MFA isn’t enough.”

Microsoft plans to fully retire Basic Authentication by 2025, but until then, this botnet will continue to exploit organizations that haven’t updated their security settings.

Tags: MalwareMicrosoftMicrosoft 365Phishing
SendShare156Tweet98
Naftary Thitu

Naftary Thitu

Tech enthusiast and ICT guru by trade, I've swapped debugging code for decoding tech trends. When I’m not wrangling with cybersecurity conundrums or geeking out over the latest gadgets, I’m busy turning techie mumbo jumbo into engaging, often hilarious, articles.

Related Posts

Microsoft Recall

Signal Blocks Microsoft Recall Feature to Protect Private Chats

May 28, 2025
Microsoft

Windows 10 and 11 May Updates Trigger Major System Failure

May 20, 2025
Apple Event

Apple Becomes First Trillion Dollar Brand in New Global Ranking

May 20, 2025
xbox-series-s

Xbox Prices Jump Worldwide as Microsoft Hikes Costs Across the Board

May 6, 2025
Microsoft hotpatching

Microsoft Introduces Paid Hotpatching to Windows Server 2025

April 28, 2025
windows 11 microsoft

How to Install Windows 11 on an Unsupported Windows 10 PC

April 23, 2025

Latest

kenya-parliament

Parliament Invites Public Feedback on Virtual Asset Bill 2025

May 30, 2025
ConnectedAfrica2025(Day4)-meta-foondamate

Connected Africa 2025 Day 4: FoondaMate and Meta Team Up to Bring AI to Classrooms

May 29, 2025
google-veo-3

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

May 29, 2025
iOS 26

Apple Plans Big Rename for iOS and macOS at WWDC 2025

May 29, 2025
University student fined for defamatory Facebook posts

University Student Fined KES 7.5 Million for Defamatory Facebook Posts

May 29, 2025
AI Africa policies database

New Platform Brings All African AI Policies Under One Database

May 28, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Parliament Invites Public Feedback on Virtual Asset Bill 2025

May 30, 2025

Connected Africa 2025 Day 4: FoondaMate and Meta Team Up to Bring AI to Classrooms

May 29, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

More News

Kenya’s Tourism Sector Grows as Travel Gets Easier Across East Africa

Researchers Develop Sodium-Ion Battery That Charges to 80% in 6 Minutes

Regulator Fines Stations Using Religious Shows to Push Gambling

Connected Africa 2025 Day 2: Focus on Digital Inclusion & Cybersecurity

iPad Users May Finally Get a Native WhatsApp App

Connected Africa Summit Calls for Unified Tech Vision

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.