An Iran-linked threat actor conducted a large-scale password spraying campaign targeting Microsoft 365 cloud environments, primarily in the Middle East. The campaign occurred in three waves during March 2026 and heavily focused on Israeli municipalities and UAE organizations. The activity leveraged anonymization (Tor, VPNs) and weak credential exploitation to gain initial access. The operation likely supported broader geopolitical objectives, including intelligence gathering aligned with military activity.
The actor utilizes a three-phase approach to compromise and exploit target environments:
1. Scan (Reconnaissance):
Conducts intensive password-spraying via Tor exit nodes to avoid IP blocking.Masquerades as Internet Explorer 10 using a specific User-Agent string.
2. Infiltrate (Initial Access):
Once valid credentials are found, the attacker performs the full login process.Uses commercial VPNs (Windscribe and NordVPN) geolocated in Israel to bypass geo-fencing restrictions.
3. Exfiltrate (Exploitation):
Leverages access to steal sensitive data, particularly personal email content.
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy