Hackers use FastHTTP in new high-speed Microsoft 365 password attacks

Source: BleepingComputer Author: Bill Toulas URL: https://www.bleepingcomputer.com/news/security/hackers-use-fasthttp-in-new-high-speed-microsoft-365-password-attacks/

  1. ONE SENTENCE SUMMARY: Threat actors are using the FastHTTP Go library for high-speed Microsoft 365 brute-force password attacks with notable success rates.

  2. MAIN POINTS:

  3. Threat actors launched attacks on Microsoft 365 accounts on January 6, 2024.

  4. The FastHTTP library is used for automated unauthorized login attempts.

  5. Brute-force attacks lead to account takeovers in 10% of cases.

  6. 65% of malicious traffic originates from Brazil, followed by other countries.

  7. 41.5% of attacks fail while 21% cause account lockouts.

  8. A PowerShell script is available for checking FastHTTP user agents in logs.

  9. Administrators should expire sessions and reset credentials upon detecting threats.

  10. Multi-factor authentication can hinder brute-force attacks, protecting 10% of accounts.

  11. The Azure Active Directory Graph API is a primary target of these attacks.

  12. Full details on indicators of compromise are included in SpearTip’s report.

  13. TAKEAWAYS:

  14. FastHTTP is exploited for efficient brute-force attacks against Microsoft accounts.

  15. Monitoring user agents is crucial for identifying potential compromises.

  16. Implementing MFA can significantly reduce account takeover risks.

  17. A proactive response plan is essential for administrators to mitigate threats.

  18. Knowledge of attack patterns helps improve organizational security measures.