1. Home
  2. News
  3. Password spraying attack on M365 accounts
  • Data Protection

Password spraying attack on M365 accounts

IT researchers have observed a botnet with over 130,000 infected systems carrying out password spraying attacks on Microsoft 365 accounts. The mass testing of user password combinations enables access to poorly secured accounts.

SecurityScorecard has found direct evidence of these attacks and advises organizations to review their systems and change credentials. Basic Authentication should be largely deactivated, but it is still active in some environments. Microsoft plans to switch it off completely by September 2025 at the latest.

These attacks show how important it is to switch to secure login procedures. Companies should actively monitor login patterns and implement mechanisms against password spraying.

Source: https://www.heise.de/news/

About Cookies

This website uses cookies. Those have two functions: On the one hand they are providing basic functionality for this website. On the other hand they allow us to improve our content for you by saving and analyzing anonymized user data. You can redraw your consent to to using these cookies at any time. Find more information regarding cookies on our Data Protection Declaration and regarding us on the Imprint.
Mandatory

These cookies are needed for a smooth operation of our website.

Name Purpose Lifetime Type Provider
CookieConsent Saves your consent to using cookies. 1 year HTML Website
fe_typo_user Assigns your browser to a session on the server. session HTTP Website
PHPSESSID Temporary cookies which is required by PHP to temporarily store data. session HTTP Website
__cfduid missing translation: trackingobject.__cfduid.desc 30 missing translation: duration.days-session HTTP Cloudflare/ report-uri.com
Statistics

With the help of these statistics cookies we check how visitors interact with our website. The information is collected anonymously.

Name Purpose Lifetime Type Provider
_pk_id Used to store a few details about the user such as the unique visitor ID. 13 months HTML Matomo
_pk_ref Used to store the attribution information, the referrer initially used to visit the website. 6 months HTML Matomo
_pk_ses Short lived cookie used to temporarily store data for the visit. 30 minutes HTML Matomo
_pk_cvar Short lived cookie used to temporarily store data for the visit. 30 minutes HTML Matomo
MATOMO_SESSID Temporary cookies which is set when the Matomo Out-out is used. session HTTP Matomo
_pk_testcookie missing translation: trackingobject._pk_testcookie.desc session HTML Matomo