Identity, Threat Intelligence
Global password spray attacks target thousands of organizations

In a threat intelligence post Thursday, Microsoft said a campaign by APT 33 began in February and used more sophisticated tactics, techniques, and procedures (TTPs) than its previous attacks. (Photo: Fabian Sommer/dpa (Photo by Fabian Sommer/picture alliance via Getty Images)
Iranian nation-state threat group APT33 attempted to infiltrate thousands of organizations — sometimes successfully — in a months-long global password spray campaign.In a threat intelligence post Thursday, Microsoft said the group’s campaign began in February and used more sophisticated tactics, techniques, and procedures (TTPs) than its previous attacks.“Based upon the profile of victim organizations targeted and the observed follow-on intrusion activity, Microsoft assesses that this initial access campaign is likely used to facilitate intelligence collection in support of Iranian state interests.”The advanced persistent threat (APT) group — which is also tracked as Peach Sandstorm, Holmium, and Refined Kitten — has shown a particular interest this year in compromising satellite, defense and pharmaceutical organizations. Password spraying involves attempting to log into multiple accounts from one organization by trying a limited number of commonly used passwords. (As opposed to brute force attacks that bombard a single account with numerous login attempts).Microsoft said in cases where APT33 was successful in breaching its targets, the group used a combination of publicly available and custom tools for discovery, persistence and lateral movement. Data was also exfiltrated in a “small number” of the intrusions Microsoft observed.The tools APT33 employed included AzureHound and Roadtools which were used to conduct reconnaissance in Microsoft Entra ID (formerly Azure Active Directory).“The same features that make these tools useful to legitimate users, like pre-built capabilities to explore and seamlessly dump data in a single database, also make these tools attractive options for adversaries seeking information about or from a target’s environment,” Microsoft said.In some cases, APT33 created new Azure subscriptions and used the access they provided to carry out additional attacks and maintain persistence on target organizations’ environments.
An In-Depth Guide to Identity
Get essential knowledge and practical strategies to fortify your identity security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds