Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Iran-linked password dissemination campaign targets more than 300 Israeli Microsoft 365 organizations

Why safety regulators closed investigation into Tesla’s remote parking feature

Apple takes its battle with the App Store back to the Supreme Court

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Iran-linked password dissemination campaign targets more than 300 Israeli Microsoft 365 organizations
Identity

Iran-linked password dissemination campaign targets more than 300 Israeli Microsoft 365 organizations

By April 6, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

As conflict continues in the Middle East, Iranian-linked attackers are suspected to be behind a password dissemination campaign targeting Microsoft 365 environments in Israel and the United Arab Emirates.

According to Check Point, this activity is assessed as ongoing and carried out in three separate attack waves that occurred on March 3, 2026, March 13, and March 23, 2026.

“This campaign is primarily focused on Israel and the UAE, impacting over 300 organizations in Israel and over 25 organizations in the UAE,” the Israeli cybersecurity firm said. “Activity related to the same actor was also observed against a limited number of targets in Europe, the United States, the United Kingdom, and Saudi Arabia.”

The campaign is assessed to target cloud environments of government agencies, local governments, organizations in the technology, transportation, and energy sectors, and private companies in the region.

Password spraying is a type of brute force attack in which a threat actor attempts to use a single common password for multiple usernames on the same application. It is also considered a more effective way to detect weak credentials at scale without invoking rate limiting defenses.

Check Point said this technique has been known to be used in the past by Iranian hacker groups such as Peach Sandstorm and Gray Sandstorm (formerly known as DEV-0343) to infiltrate targeted networks.

The campaign will basically unfold in three phases. An aggressive scan or password spray performed from a Tor exit node, followed by execution of a login process and extraction of sensitive data such as mailbox contents.

“Analysis of M365 logs suggests similarities to Gray Sandstorm, including the use of Red Team tools to execute these attacks via Tor exit nodes,” Check Point said. “The attackers used a commercial VPN node hosted on AS35758 (Rachamim Aviel Twito), which is consistent with recent activity related to Iranian-linked activity in the Middle East.”

To combat this threat, organizations are encouraged to monitor sign-in logs for signs of password spraying, apply conditional access controls to limit authentication to approved geographic locations, enforce multi-factor authentication (MFA) for all users, and enable audit logging for post-breach investigations.

Iran revives Pay2Key business

The disclosure comes after U.S. healthcare institutions were targeted in late February 2026 by Pay2Key, an Iranian ransomware group with ties to the country’s government. Ransomware-as-a-Service (RaaS) operations associated with the Fox Kitten group first emerged in 2020.

The variant introduced in this attack is an upgrade from a previous campaign observed in July 2025, using improved evasion, execution, and anti-forensic techniques to achieve its objectives. Beazley Security and Halcyon said no data was compromised during the attack, a change from the group’s dual extortion scheme.

The attack allegedly leveraged unidentified access routes to infiltrate organizations, use legitimate remote access tools such as TeamViewer to establish a foothold, collect credentials for lateral movement, disable Microsoft Defender Antivirus by falsely reporting third-party antivirus products were active, prevent recovery, deploy ransomware, drop ransom notes, and wipe logs to cover their tracks.

“By clearing the logs at the end of execution rather than at the beginning, attackers ensure that they erase not only the pre-ransomware activity, but even the ransomware’s own activity,” Halcyon said.

Among the key changes the group enacted after its return last year was offering affiliates a 70% to 80% reduction in ransom proceeds if they participate in attacks targeting Iran’s enemies. A month later, a Linux variant of Pay2Key ransomware was detected in the wild.

“The samples are configuration-driven, require root-level privileges to run, and are designed to traverse a wide range of file systems, classify mounts, and encrypt data using ChaCha20 in full or partial mode,” Morphisec researcher Ilia Kulmin said in a report published last month.

“Before encryption, we weaken defenses and remove friction by stopping services, killing processes, disabling SELinux and AppArmor, and installing reboot cron entries. This allows encryption programs to run faster and survive reboots.”

In March 2026, Halcyon also revealed that Uke, the custodian of Sicarii ransomware, had urged pro-Iranian operators to use Baqiyat 313 Locker (also known as BQTlock) due to an influx of affiliate requests. BQTLock, which operates with pro-Palestinian motives, has been targeting the UAE, the United States, and Israel since July 2025.

“Iran has a long track record of using cyber operations to retaliate against perceived political slights,” the cybersecurity firm said. “Ransomware is increasingly integrated into these activities, and ransomware campaigns are blurring the line between criminal extortion and state-sponsored sabotage.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy safety regulators closed investigation into Tesla’s remote parking feature

Related Posts

North Korea-linked hackers use GitHub as C2 in multi-stage attack targeting South Korea

April 6, 2026

How SOCs solve critical risks in three steps

April 6, 2026

Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More

April 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Iran-linked password dissemination campaign targets more than 300 Israeli Microsoft 365 organizations

Why safety regulators closed investigation into Tesla’s remote parking feature

Apple takes its battle with the App Store back to the Supreme Court

North Korea’s hijacking of one of the most used open source projects on the web has likely been in the works for weeks.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.