New High-Speed Microsoft 365 Attacks: Hackers Weaponize FastHTTP to Crack Passwords

New High-Speed Microsoft 365 Attacks: Hackers Weaponize FastHTTP to Crack Passwords

Microsoft 365 Under Attack: FastHTTP-Powered Password Brute-Force Campaign

A sophisticated cyber attack campaign targeting Microsoft 365 accounts worldwide has been uncovered by SpearTip security researchers. The attacks, which began on January 6, 2024, exploit the FastHTTP Go library to launch high-speed brute-force password attempts against Azure Active Directory Graph API.

Attack Methodology
The threat actors leverage FastHTTP, a high-performance HTTP library for Go, to automate unauthorized login attempts. The attacks target Azure Active Directory endpoints through two primary methods:
– Password brute-forcing
– MFA Fatigue attacks through repeated authentication challenges

Geographic Distribution and Success Rate
– 65% of malicious traffic originates from Brazil
– Additional attacks from Turkey, Argentina, Uzbekistan, Pakistan, and Iraq
– Attack outcomes:
* 41.5% Failed attempts
* 21% Account lockouts
* 17.7% Policy violations
* 10% MFA-protected
* 9.7% Successful account compromises

Detection and Mitigation
Administrators can detect attacks by:
1. Using SpearTip’s PowerShell script to check for FastHTTP user agent
2. Monitoring Azure portal sign-in logs for suspicious “Other Clients” activity

Recommended Security Measures:
– Immediate session termination and credential reset upon detection
– Review and removal of unauthorized MFA devices
– Implementation of robust access policies

The campaign’s 10% success rate poses a significant threat to organizational security, potentially leading to data breaches and service disruptions.

Share This Article