Microsoft Confirms Massive Password Spraying Attack: How to Protect Your Accounts in 2025


🔍 What Happened?

A botnet comprising at least 130,000 compromised devices, likely affiliated with a Chinese threat group, executed a large-scale password spraying campaign against Microsoft 365 accounts.
These attacks focused on non-interactive sign-ins using Basic Authentication—a method deprecated by Microsoft due to its security weaknesses.
Notably, these attacks often bypassed multi-factor authentication (MFA) since non-interactive sign-ins don't typically trigger MFA prompts.

Simultaneously, Microsoft Threat Intelligence reported that the Iranian hacking group Peach Sandstorm (APT33) employed similar tactics.
They targeted sectors like satellite communications, defense, and education, deploying a custom backdoor named "Tickler" after gaining initial access via password spraying or social engineering.


🧠 Understanding Password Spraying

Password spraying is a brute-force attack where adversaries attempt a few commonly used passwords across numerous accounts.
This method avoids account lockouts that typically occur when multiple incorrect passwords are tried on a single account.

Key Characteristics:

  • Low and Slow Approach: Attackers distribute login attempts over time and across various IP addresses to evade detection.

  • Targeting Legacy Protocols: Protocols like SMTP and IMAP, especially when using Basic Authentication, are prime targets due to their susceptibility.

  • Non-Interactive Sign-Ins: These sign-ins, often used for automated processes, don't prompt for MFA, making them attractive to attackers.


🛡️ How to Protect Your Organization

1. Enforce Multi-Factor Authentication (MFA)

Implement MFA across all accounts, including service and non-interactive accounts, to add an extra layer of security.

2. Disable Basic Authentication

Transition to modern authentication methods and disable Basic Authentication to prevent exploitation.

3. Implement Strong Password Policies

Use tools like Azure AD Password Protection to enforce the use of complex, non-common passwords and prevent the use of easily guessable credentials.

4. Monitor for Unusual Sign-In Activity

Utilize security information and event management (SIEM) systems to detect patterns indicative of password spraying, such as multiple failed login attempts from a single IP address.

5. Educate Employees

Conduct regular training sessions to inform employees about the dangers of password reuse and the importance of recognizing phishing attempts.


📈 Implications for Microsoft and the Broader Cybersecurity Landscape

These incidents highlight the persistent threats posed by state-sponsored cybercriminal groups.
Organizations must remain vigilant, regularly updating their security protocols and staying informed about emerging threats.

For Microsoft, these attacks reinforce the importance of their ongoing efforts to deprecate insecure authentication methods and promote the adoption of robust security measures across their platforms.


By understanding the nature of password spraying attacks and implementing comprehensive security strategies, organizations can significantly reduce their vulnerability to such threats.