Security6 min readThe Hacker News

Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations

P
Redakcja Pixelift0 views
Share
Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations

Foto: The Hacker News

More than 300 organizations using Microsoft 365 have been targeted in a massive password-spraying campaign orchestrated by groups linked to Iran. The latest Zscaler ThreatLabz 2024 VPN Risk Report reveals that the development of artificial intelligence has drastically reduced the time required for hackers to breach security, making remote access the fastest path to compromising an IT structure. Attackers are utilizing automated tools to test common passwords on thousands of accounts simultaneously, bypassing traditional detection systems that often struggle to identify distributed login attempts. For users and administrators of global cloud systems, this is a clear signal that static passwords have ceased to serve a protective function. In the age of AI, which can instantaneously generate and match credential variants, the implementation of Zero Trust policies and advanced Multi-Factor Authentication (MFA) has become critical. The practical implications are relentless: every company operating in a hybrid model must accept that VPN vulnerabilities and a lack of network segmentation are currently the weakest links, which AI can exploit in just minutes. Effective defense now requires a transition to biometrics or hardware keys, which completely eliminate vulnerability to password-spraying attacks.

Modern geopolitical conflicts are increasingly shifting from physical battlefields to the digital sphere, where the line between military actions and intelligence operations is becoming completely blurred. The latest report published by experts from Check Point sheds light on a large-scale cyber campaign orchestrated by an Iran-nexus threat actor. The target of the attack was over 300 organizations in Israel and the United Arab Emirates using Microsoft 365 environments. This is not a random incident, but a precisely planned operation utilizing the password-spraying technique, hitting the foundations of corporate and government communication in the Middle East region.

The scale of this operation is impressive and demonstrates how political determination translates into digital resources. According to analytical data, the attack was not a one-off surge but a systematic process carried out in three precise strike waves. These took place on March 3, March 13, and March 23, 2026, respectively. Such cyclicality suggests that the attackers possess not only advanced infrastructure but also the patience necessary to monitor the reactions of defense systems and adjust subsequent steps to maximize the effectiveness of breaches into Microsoft's cloud ecosystems.

Attack Mechanics and Exploitation of Microsoft 365 Weaknesses

The password-spraying technique used by the aggressors differs from a classic brute-force attack in that instead of trying thousands of passwords on a single account (which quickly leads to a lockout), attackers test one common password across thousands of different accounts. This allows them to bypass standard anomaly detection mechanisms and account blocks. In the case of Microsoft 365 environments, which are the standard for business communication, success on even a fraction of a percent of accounts gives attackers access to email, cloud documents, and internal communication channels, which is of invaluable intelligence value in the context of the ongoing conflict in the Middle East.

Cloud infrastructure attack diagram
Password-spraying operations are becoming an increasingly effective tool in the hands of state-linked groups.

From a technological perspective, this campaign highlights the problem of securing identity in distributed SaaS systems. Attackers target organizations that, despite using modern tools, still struggle with password hygiene or have not fully implemented rigorous multi-factor authentication (MFA) policies. Check Point indicates that this activity is assessed as ongoing, meaning the infrastructure used for the attacks is constantly being modified to avoid detection by Microsoft's global security systems.

The Role of Artificial Intelligence in Shortening Response Times

In the context of these events, the conclusions from the Zscaler ThreatLabz 2026 VPN Risk Report, prepared in collaboration with Cybersecurity Insiders, are extremely significant. This document puts forward a bold thesis: artificial intelligence has collapsed the human response window. In an era of automated campaigns, such as those targeting Israeli companies, traditional methods of monitoring and manually blocking suspicious logins are becoming an anachronism. AI allows attackers to generate more convincing scenarios and rotate IP addresses faster, making the attack almost impossible to stop without equally advanced defense systems based on machine learning.

The Zscaler report also emphasizes that remote access has become the fastest path to breach. In a world where hybrid work and access to cloud resources from anywhere on earth are the norm, vulnerabilities in VPN protocols and weaknesses in Microsoft 365 security become a "highway" for groups such as those linked to Iran. Since an attacker can gain access to an employee's account using a simple but mass password attack, the entire network security architecture is bypassed from the very start.

Cyber threat analysis
The use of AI by APT groups drastically shortens the time needed to carry out a successful breach.

Anatomy of the Threat and Target Specification

The Check Point analysis allows for the identification of key features of this campaign that distinguish it from common cybercrime. Above all, the precision in target selection is striking – over 300 organizations in Israel and the UAE are entities of strategic importance, often linked to critical infrastructure, the financial sector, or public administration. The main aspects of the campaign include:

  • Concentrated Strikes: The use of three specific dates in March 2026 suggests coordination with political or military events in the region.
  • Geolocation: The focus on Israel and the United Arab Emirates reflects current axes of tension in the Middle East.
  • Microsoft 365 Exploitation: Leveraging the market-dominant position of the Office suite to conduct espionage activities.
  • Sophisticated Password-Spraying: Using techniques that minimize the risk of detection by identity protection systems.
"The campaign is primarily motivated by strategic goals, where access to data within Microsoft 365 serves as a powerful tool in the ongoing regional conflict."

This approach shows that APT (Advanced Persistent Threat) groups from the Iran region are increasingly proficient at operating in the cloud. They are no longer just looking for software vulnerabilities (0-days), but are exploiting the weakest link in any system – the human being and their tendency to use predictable passwords combined with a lack of enabled MFA.

A New Defense Paradigm in the AI Era

In the face of such organized attacks, the traditional reactive approach to cybersecurity must give way to Zero Trust models. Since, as Zscaler points out, AI has drastically shortened response times, defense systems must operate autonomously. Every login attempt, even with a correct password, should be verified for context: location, device, time of day, and unusual behavioral patterns that Check Point and Zscaler systems identify as anomalies.

For global organizations, the message is clear: Microsoft 365 cloud security is not a permanent state but a process requiring constant vigilance. The campaign targeting Israel and the UAE is a testing ground for new digital warfare methods that may soon be adopted against targets in other parts of the world. The effectiveness of the password-spraying technique in 2026 is a painful reminder that basic digital identity configuration errors remain the most dangerous weapon in the hands of state threat actors.

Cyber warfare in the Middle East is entering a phase where intelligence data obtained from the cloud becomes as significant as troop movements on the border. The scale of the attack on 300 organizations is a clear signal that attackers feel confident within the infrastructure of Western tech giants. The industry must prepare for a reality where user identity is permanently under attack by algorithms capable of breaking security at a pace that a human operator cannot even monitor, let alone effectively intervene against.

Comments

Loading...