{"id":45163,"date":"2026-04-07T03:25:59","date_gmt":"2026-04-06T19:25:59","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations\/"},"modified":"2026-04-07T03:25:59","modified_gmt":"2026-04-06T19:25:59","slug":"iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations\/","title":{"rendered":"Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgf4g-Zhhi4P6IHkSqUlU3EzCQNKPJ1nV3mWfQAtS6gfGu6H7wuq5OgVXGvF1IM2afayopX3b0zj4bjVDYaO7dBc4rl0A0Y6GND1VkbLdug_ULVW6a6P7iNlhUFGwMsRSDHqbodsc8EeLcg2nXxDPXO0h8RABu_jr9o-5cx8g5GTXxFgDOx9PTRQIFECpL\/s1600\/iran.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgf4g-Zhhi4P6IHkSqUlU3EzCQNKPJ1nV3mWfQAtS6gfGu6H7wuq5OgVXGvF1IM2afayopX3b0zj4bjVDYaO7dBc4rl0A0Y6GND1VkbLdug_ULVW6a6P7iNlhUFGwMsRSDHqbodsc8EeLcg2nXxDPXO0h8RABu_jr9o-5cx8g5GTXxFgDOx9PTRQIFECpL\/s1600\/iran.jpg\" alt=\"Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations\"\/><\/a><\/div>\n<p>An&nbsp;Iran-nexus threat actor is suspected to be behind a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E. amid&nbsp;ongoing conflict in the Middle&nbsp;East.<\/p>\n<p>The&nbsp;activity, assessed to be ongoing, was carried out in three distinct attack waves that took place on March 3, March 13, and March 23, 2026, per Check&nbsp;Point.<\/p>\n<p>&#8220;The campaign is primarily focused on Israel and the U.A.E., impacting more than 300 organizations in Israel and over 25 in the U.A.E.,&#8221; the Israeli cybersecurity&nbsp;company <a href=\"https:\/\/blog.checkpoint.com\/research\/iran-nexus-password-spray-campaign-targeting-cloud-environments-with-a-focus-on-the-middle-east\/\">said<\/a>. &#8220;Activity associated with the same actor was also observed against a limited number of targets in Europe, the United States, the United Kingdom, and Saudi&nbsp;Arabia.&#8221;<\/p>\n<p>The&nbsp;campaign is assessed to have targeted the cloud environments of government entities, municipalities, technology, transportation, energy sector organizations, and private-sector companies in the&nbsp;region.<\/p>\n<p>Password spraying is a form of brute-force attack where a threat actor attempts to use a single common password against multiple usernames on the same application. It&#8217;s also considered a more effective way to discover weak credentials at scale without triggering rate-limiting&nbsp;defenses.<\/p>\n<p>Check&nbsp;Point said the technique is known&nbsp;to be adopted by Iranian hacking groups&nbsp;like <a href=\"https:\/\/thehackernews.com\/2023\/09\/iranian-nation-state-actors-employ.html\">Peach&nbsp;Sandstorm<\/a>&nbsp;and <a href=\"https:\/\/thehackernews.com\/2021\/11\/microsoft-warns-about-6-iranian-hacking.html\">Gray&nbsp;Sandstorm<\/a> (formerly DEV-0343) in the past to infiltrate target&nbsp;networks.<\/p>\n<p>The&nbsp;campaign essentially unfolds over three phases: aggressive scanning or password-spraying conducted from Tor exit nodes, followed by conducting the login process, and exfiltrating sensitive data, such as mailbox&nbsp;content.&nbsp;<\/p>\n<p>&#8220;Analysis of M365 logs suggests similarities&nbsp;to <a href=\"https:\/\/thehackernews.com\/2021\/10\/microsoft-warns-of-iran-linked-hackers.html\">Gray&nbsp;Sandstorm<\/a>, including the use of red-team tools to conduct these attacks via Tor exit nodes,&#8221; Check Point said. &#8220;The threat actor used commercial VPN nodes hosted at AS35758 (Rachamim Aviel Twito), which aligns with recent activity tied to Iran-nexus operations in the Middle&nbsp;East.&#8221;<\/p>\n<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHbNaFhZBmg3dKK5IaFBfhmxVsYY4bgK_mOVzW-5aEedBlUGl932v_zXzU3kT6WL0eq_TG0fYzpJTaYg-7vcpBxDovjr8LI2bsilaxprfPzb2ZzsZJwiTRY9k8hDm0nB1F9smqLhWKvxDsjoHrXOV60CWc2yqo6XlOJFvIlkMuGkAs6gIWyb2oPR7jvwD6\/s1600\/cp.png\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" border=\"0\" data-original-height=\"859\" data-original-width=\"1320\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHbNaFhZBmg3dKK5IaFBfhmxVsYY4bgK_mOVzW-5aEedBlUGl932v_zXzU3kT6WL0eq_TG0fYzpJTaYg-7vcpBxDovjr8LI2bsilaxprfPzb2ZzsZJwiTRY9k8hDm0nB1F9smqLhWKvxDsjoHrXOV60CWc2yqo6XlOJFvIlkMuGkAs6gIWyb2oPR7jvwD6\/s1600\/cp.png\" alt=\"Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations\" \/><\/a><\/div>\n<p> <a name=\"more\"><\/a> <\/p>\n<p>To&nbsp;counter the threat, organizations are advised to monitor sign-in logs for signs of password spraying, apply conditional access controls to limit authentication to approved geographic locations, enforce multi-factor authentication (MFA) for all users, and enable audit logs for post-compromise investigation.<\/p>\n<h3>Iran Revives Pay2Key Operations<\/h3>\n<p>The&nbsp;disclosure comes as a U.S. healthcare organization was targeted in late February 2026&nbsp;by <a href=\"https:\/\/thehackernews.com\/2021\/05\/researchers-uncover-iranian-state.html\">Pay2Key<\/a>, an Iranian ransomware gang with ties to the country&#8217;s government. The&nbsp;ransomware-as-a-service (RaaS) operation, which has ties to the Fox Kitten group, first emerged in&nbsp;2020.<\/p>\n<p>The&nbsp;variant deployed in the attack is an upgrade from prior&nbsp;campaigns <a href=\"https:\/\/thehackernews.com\/2025\/07\/iranian-backed-pay2key-ransomware.html\">observed<\/a> in July 2025, using improved evasion, execution, and anti-forensics techniques to achieve its goals. According to Beazley Security and Halcyon, no data was exfiltrated during the attack, a shift from the group&#8217;s double extortion&nbsp;playbook.&nbsp;<\/p>\n<p>The&nbsp;attack is said to have leveraged an undetermined access route to breach the organization, using a legitimate remote access tool like TeamViewer to establish a foothold, then harvest credentials for lateral movement, disarm Microsoft Defender Antivirus by falsely signaling that a third-party antivirus product is active, inhibit recovery, deploy ransomware, drop a ransom note, and clear logs to cover up the&nbsp;tracks.<\/p>\n<p>&#8220;By clearing logs at the end of execution rather than the beginning, the actors ensure that even the ransomware&#8217;s own activity is wiped, not just whatever preceded it,&#8221;&nbsp;Halcyon <a href=\"https:\/\/www.halcyon.ai\/ransomware-research-reports\/pay2key-iranian-linked-ransomware-is-back-back-again\">said<\/a>.<\/p>\n<p>Among&nbsp;the <a href=\"https:\/\/thehackernews.com\/2025\/07\/iranian-backed-pay2key-ransomware.html\">key&nbsp;changes<\/a> the group enacted following its return last year was offering affiliates an 80% cut of ransom proceeds, up from 70%, for participating in attacks targeting Iran&#8217;s enemies. A&nbsp;month later, a Linux variant of the Pay2Key ransomware was detected in the&nbsp;wild.<\/p>\n<p>&#8220;The sample is configuration-driven, requires root-level privileges to execute, and is engineered to traverse broad file system scope, classify mounts, and encrypt data using ChaCha20 in full or partial modes,&#8221; Morphisec researcher Ilia&nbsp;Kulmin <a href=\"https:\/\/www.morphisec.com\/blog\/inside-pay2key-technical-analysis-of-a-linux-ransomware-variant\/\">said<\/a> in a report published last&nbsp;month.<\/p>\n<p>&#8220;Before encryption, it weakens defenses and removes friction by stopping services, killing processes, disabling SELinux and AppArmor, and installing a reboot-time cron entry. This&nbsp;lets the encryptor run faster and survive restarts.&#8221;<\/p>\n<p>In&nbsp;March 2026, Halcyon&nbsp;also <a href=\"https:\/\/www.halcyon.ai\/ransomware-alerts\/pro-iranian-ransomware-operators-tactical-shift-from-sicarii-to-bqtlock\">revealed<\/a> that the administrator&nbsp;of <a href=\"https:\/\/thehackernews.com\/2026\/01\/new-osiris-ransomware-emerges-as-new.html\">Sicarii<\/a> ransomware, Uke, urged pro-Iranian operators to use Baqiyat 313 Locker (aka BQTlock) due to the influx of affiliate requests. BQTLock, which operates with pro-Palestinian motives, has targeted the U.A.E., the U.S., and Israel since July&nbsp;2025.<\/p>\n<p>&#8220;Iran has a long track record of using cyber operations to retaliate against perceived political slights,&#8221; the cybersecurity&nbsp;company <a href=\"https:\/\/www.halcyon.ai\/ransomware-alerts\/iranian-use-of-cybercriminal-tactics-in-destructive-cyber-attacks-2026-updates\">said<\/a>. &#8220;Ransomware is increasingly incorporated into these operations, with ransomware campaigns that blur the line between criminal extortion and state-sponsored sabotage.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>An&nbsp;Iran-nexus threat actor is suspected to be behind a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E. amid&nbsp;ongoing conflict in the Middle&nbsp;East.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45163","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45163"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45163\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}