Global brute-force attacks target Microsoft 365 accounts using FastHTTP Go library

Global brute-force attacks target Microsoft 365 accounts using FastHTTP Go library

A coordinated cyberattack targeting Microsoft 365 accounts worldwide has been detected, utilizing the FastHTTP Go library to launch high-speed brute-force password attacks. The campaign, which was discovered on January 13, 2025, is primarily aimed at the Azure Active Directory Graph API, according to incident response firm SpearTip.

The SpearTip Security Operations Center (SOC) reports that the attackers are using the FastHTTP framework, a high-performance HTTP server and client library in the Go programming language, to efficiently execute their brute-force attacks. FastHTTP is known for its ability to handle large volumes of HTTP requests with improved throughput and lower latency, making it an ideal tool for scaling attack efforts under high load.

Researchers from SpearTip have found that the brute-force attempts have resulted in account takeovers approximately 10% of the time. The attackers are using a combination of brute-force login attempts and attempts to bypass multi-factor authentication (MFA).

Analysis of the attack traffic showed that 65% of the malicious requests are originating from Brazil, with attackers using a wide array of Autonomous System Numbers (ASNs) and IP addresses to obscure their activities. Other countries contributing to the attack traffic include Turkey, Argentina, Uzbekistan, Pakistan, and Iraq, each accounting for roughly 2–3% of the total observed traffic.

The widespread distribution of attack traffic suggests that the threat actors are likely using a botnet or leveraging compromised systems in multiple regions to carry out the attacks.


Back to the list

Latest Posts

Cyber Security Week in Review: July 4, 2025

Cyber Security Week in Review: July 4, 2025

In brief: Google patches Chrome 0Day, the US is on the hunt for North Korean IT workers, and more.
4 July 2025
AI chatbots fall for phishing scams

AI chatbots fall for phishing scams

The models provided the correct URL only 66% of the time; nearly 30% of responses pointed users to dead or suspended domains.
3 July 2025
Chinese hackers exploited Ivanti flaws in attacks against French government

Chinese hackers exploited Ivanti flaws in attacks against French government

ANSSI believes that the Houken campaign is operated by ‘UNC5174’, an entity believed to act as an initial access broker for China’s Ministry of State Security.
2 July 2025