Security advisories

FastHTTP Bruteforce Attacks

January 17, 2025 | 2 MINS READ

Speak With A Security Expert Now

TALK TO AN EXPERT

THE THREAT

Security researchers from SpearTip have identified an ongoing campaign which employs Fasthttp to conduct bruteforce and Multi-Factor Authentication (MFA) fatigue attacks. eSentire has observed activity involving Fasthttp that matches the description provided by SpearTip.

Threat actors are weaponizing Fasthttp, a high-performance HTTP server and client library for the Go programming language, to automate unauthorized login attempts. This activity has specifically targeted Azure Active Directory Graph API and leads to either bruteforce or MFA fatigue attacks.

To prevent this activity, organizations are strongly encouraged to review and implement the recommendations provided below.

What we’re doing about it

What you should do about it

Prevention Recommendations:

Identifying Malicious Activity:

Additional information

The goal of this campaign is to gain illicit access to organizations Microsoft 365 accounts. The campaign has been ongoing since at least January 6th. The use of FastHTTP enables threat actors to automate this activity and increase the overall number of attacks. In a bruteforce attack scenario, threat actors repeatedly attempt to gain access to an account via password attempts. In an MFA Fatigue scenario, threat actors repeated triggering MFA notifications until a user accepts the MFA request, either accidentally or out of frustration.

According to SpearTip, the success rate of this activity is just under 10%, as over 40% of attacks fail, 21% lead to account lockouts due to existing security controls, 10% are prevented by strong MFA, and 17% are detected due to policy violations. These attacks result in the takeover of Microsoft 365 accounts, which can then be used by threat actors for a variety of malicious purposes, including direct data theft or secondary attacks, such as Business Email Compromise. To prevent this activity, organizations can create conditional access policies to allow users to login only from approved devices and specific IP ranges.

Indicators of Compromise

187.94.1[.]189

Source IP Address

177.234.244[.]139

Source IP Address/p>

45.225.192[.]229

Source IP Address

197.206.90[.]134

Source IP Address

206.42.30[.]238

Source IP Address

201.140.249[.]223

Source IP Address

170.78.23[.]213

Source IP Address

Figure 1: Policy Recommendation reference image 
Figure 1: Policy Recommendation reference image 

References:

[1] https://www.speartip.com/fasthttp-used-in-new-bruteforce-campaign/
[2] https://learn.microsoft.com/en-us/mem/intune/protect/device-compliance-get-started
[3] https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-assignment-network
[4] https://techcommunity.microsoft.com/blog/identity/defend-your-users-from-mfa-fatigue-attacks/2365677
[5] https://learn.microsoft.com/en-us/defender-cloud-apps/user-activity-policies

View Most Recent Advisories