Hackers are on a huge Microsoft 365 password spraying spree – here’s what you need to know
Threat actors have found an ingenious way to exploit legacy authentication processes and bypass MFA and conditional access policies
A botnet made up of 130,000 compromised devices has been conducting a huge password spraying campaign targeting Microsoft 365 accounts, according to a new report.
Researchers at SecurityScorecard warned that an unnamed threat actor has been compromising Microsoft 365 accounts by exploiting the non-interactive sign-in process that uses basic authentication.
Non-interactive sign-in refers to a login method that requires no action from the user and is handled by the platform or client application, which often doesn’t trigger MFA.
Basic authentication is a relatively old method of user authentication that simply sends the user’s credentials to the server in plain text to verify their identity.
The report said the campaign was first uncovered after a number of failed sign-in attempts were noted in the non-interactive sign-in logs on a Microsoft 365 tenant its STRIKE team was given access to.
The STRIKE team identified a number of recurring IP addresses that were in communication with the IPs involved in the failed login attempts, with six referring to servers hosted via a US-based provider SharkTech that has been previously flagged for hosting malicious activity.
The SharkTech servers are believed to be the command and control (C2) servers used in the campaign, with other parts of the attack infrastructure, namely proxy servers, linked to two other hosting providers with links to China.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
A four hour snapshot revealed the C2 servers were talking to over 130,000 compromised devices, all being leveraged to conduct a mass password spraying campaign using credentials stolen from infostealer logs.
The botnet systemically attempted these credentials across a range of Microsoft 365 accounts to minimize account lockouts while maximizing the likelihood of compromise.
Many firms are blind to password spraying threats
The report noted that non-interactive sign-ins via basic authentication means the attackers are able to avoid MFA enforcement as well as potentially also bypass conditional access policies (CAP).
It added that by finding a way to ensure their login events are only logged in the sign-in logs, which do not always generate security alerts, the attackers are able to minimize their visibility.
Security Scorecard warned this technique has created a “critical blind spot for security teams” where they can conduct high-volume password spraying attempts undetected.
The tactic has been observed across multiple Microsoft 365 tenants, the report added, which it said indicates a “widespread and ongoing threat”, noting that organizations that rely solely on interactive sign-in monitoring will be completely blind to these attacks.
RELATED WHITEPAPER
Microsoft is still in the process of progressively deprecating basic authentication, with full retirement of the process set for September 2025, but until then the researchers have warned this campaign presents an immediate threat to those using it.
The report concluded that the attacker’s use of non-interactive sign-in logs to evade MFA and potentially also CAP underscores the importance for organizations to update their authentication strategies.
Security teams should review their non-interactive sign-in logs for unauthorized access attempts, rotate the credentials for accounts flagged in recent sign-in attempts, as well as disable legacy authentication protocols such as basic authentication.
Businesses should also try to monitor for stolen credentials linked to their organization in infostealer logs and implement CAPs that restrict non-interactive login attempts.
MORE FROM ITPRO

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
-
Trump's AI executive order could leave US in a 'regulatory vacuum'News Citing a "patchwork of 50 different regulatory regimes" and "ideological bias", President Trump wants rules to be set at a federal level
-
TPUs: Google's home advantageITPro Podcast How does TPU v7 stack up against Nvidia's latest chips – and can Google scale AI using only its own supply?
-
Microsoft Teams is getting a new location tracking feature that lets bosses snoop on staff – research shows it could cause workforce pushbackNews A new location tracking feature in Microsoft Teams will make it easier to keep tabs on your colleague's activities – and for your boss to know exactly where you are.
-
Microsoft opens up Entra Agent ID preview with new AI featuresNews Microsoft Entra Agent ID aims to help manage influx of AI agents using existing tools
-
A notorious ransomware group is spreading fake Microsoft Teams ads to snare victimsNews The Rhysida ransomware group is leveraging Trusted Signing from Microsoft to lend plausibility to its activities
-
CISA just published crucial new guidance on keeping Microsoft Exchange servers secureNews With a spate of attacks against Microsoft Exchange in recent years, CISA and the NSA have published crucial new guidance for organizations to shore up defenses.
-
CISA issues alert after botched Windows Server patch exposes critical flawNews A critical remote code execution flaw in Windows Server is being exploited in the wild, despite a previous 'fix'
-
Microsoft issues warning over “opportunistic” cyber criminals targeting big businessNews Microsoft has called on governments to do more to support organizations
-
A terrifying Microsoft flaw could’ve allowed hackers to compromise ‘every Entra ID tenant in the world’News The Entra ID vulnerability could have allowed full access to virtually all Azure customer accounts
-
Microsoft and Cloudflare just took down a major phishing operationNews RaccoonO365’s phishing as a service platform has risen to prominence via Telegram