Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
ZiChatBot Malware Uses Zulip APIs for Command & REST Control
May 8, 2026
Hackers Use Hugging Face & ClawHub to Deploy Malware
May 8, 2026
Fake Moustache Bypasses Age Verification, Raises Online Safety
May 8, 2026
Home/Threats/Iran-Linked Hackers Target Microsoft 365 in Launch Password
Threats

Iran-Linked Hackers Target Microsoft 365 in Launch Password

Iran-linked hackers are targeting Microsoft 365 tenants in the Middle East with a new password spray campaign. This activity, detailed in a recent cybersecurity report, marks another instance of...

Marcus Rodriguez
Marcus Rodriguez
April 7, 2026 4 Min Read
4 0

Iran-linked hackers are targeting Microsoft 365 tenants in the Middle East with a new password spray campaign. This activity, detailed in a recent cybersecurity report, marks another instance of state-sponsored threat actors exploiting common cloud services for unauthorized access. The campaign specifically focuses on organizations within the Middle Eastern region, attempting to compromise accounts through widespread, low-volume credential guessing attacks.

Rather than starting with malware files or software exploits, the attackers are trying to break in through weak passwords and exposed cloud accounts.

The case shows how a basic identity attack can still open access to email, documents, and admin tools inside a single tenant.

According to the report, the activity came in three waves on March 3, March 13, and March 23, 2026, with the main focus on Israel and the United Arab Emirates.

More than 300 organizations in Israel and over 25 in the UAE were affected, while smaller sets of targets were also seen in Europe, the United States, the United Kingdom, and Saudi Arabia. Government entities, municipalities, energy groups, and private companies were all in scope.

After the second wave drew attention, Check Point researchers identified the operation as an Iran-linked campaign aimed at Microsoft 365 cloud environments.

The company assessed with moderate confidence that the actor originates from Iran, based on the sectors targeted, the regional focus, and the technical behavior seen in login logs.

The researchers also linked the targeting of Israeli municipalities to possible support for kinetic operations and bombing damage assessment during March.

Password spraying differs from a classic brute-force attack because it tries a few common passwords against many accounts instead of repeatedly attacking one user.

In this campaign, the actor used many source IP addresses, which made simple IP-based blocking less useful and made the activity easier to miss as background login noise.

Once valid credentials were found, the attackers could move into mailboxes and other sensitive cloud data without dropping loud malware first.

Attack cycle

The attack cycle gives the clearest view of how the operation worked. While the Iran-nexus Password Spraying Volume Over Time March 2026 shows that the login activity rose in distinct bursts, suggesting planned waves instead of random scanning.

Iran-nexus Password Spraying Volume Over Time – March 2026 (Source - Check Point)
Iran-nexus Password Spraying Volume Over Time – March 2026 (Source – Check Point)

The attack cycle describes three stages: scan, infiltrate, and exfiltrate. During scanning, the actor used Tor exit nodes that changed often and sent requests with a user agent made to look like Internet Explorer 10 on Windows 7.

Attack Cycle (Source - Check Point)
Attack Cycle (Source – Check Point)

That rotation reduced the value of single indicators and forced defenders to look at timing, volume, and the spread of failed logins across accounts.

The next step began when the attackers found working credentials. Check Point said the full login process then shifted to commercial VPN ranges tied to Windscribe and NordVPN that were geolocated in Israel, a move that may have helped the actor pass geo-restrictions or reduce alerts tied to foreign access.

“Example Organization – A failed sign-in attempts for accounts in the tenant” captures the type of failed sign-in pattern that can appear before a successful compromise.

Example organization A – Failed sign in attempts for accounts in the tenant (Source - Check Point)
Example organization A – Failed sign in attempts for accounts in the tenant (Source – Check Point)

By entering through valid accounts, the actor could reach personal email content and other sensitive cloud information while avoiding the noise that often comes with malware delivery or destructive actions.

The report says Israeli municipalities appeared to be the main focus, both in the number of organizations targeted and in the volume of password-spraying attempts, but government, energy, and private-sector targets were also hit.

The recommendations are straightforward: watch sign-in logs for many failures across different accounts from one source, apply location-based access controls, block Tor where possible, enforce tenant-wide multi-factor authentication, improve password hygiene, and keep audit logs enabled for post-compromise investigation.

These steps matter because a password spray attack does not need advanced malware to cause harm; one weak password can quietly give an adversary lasting access to a cloud workspace that staff trust every day.

That is why identity monitoring now matters as much as endpoint monitoring for organizations that rely on Microsoft 365 for daily communication, because the simplest attack path can create the biggest opening when many services, users, and records sit behind one password.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwareThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Microsoft Defender Update for Windows 11, 1 Releases Server

Next Post

Threat Actors Phish with LogMeIn Resolve & Screen Abuse ScreenConnect

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DarkMoon AI Autonomous Pen Testing Platform with 50+
May 8, 2026
RansomHouse Claims Access to Trellix Source Code Breach Parts
May 8, 2026
PCPJack Worm Targets Docker, Kubernetes, Redis Credential
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us