Iranian Hackers Launch Coordinated Password Spray Attacks on Middle East

Iranian APT Gray Sandstorm Linked to Password Spray Attacks Supporting Kinetic Operations in Middle East

HIGH
April 2, 2026
6m read
Threat ActorCyberattackPhishing

Related Entities

Threat Actors

Organizations

Products & Tech

Full Report

Executive Summary

A widespread password spray campaign targeting Microsoft 365 accounts has been attributed to an Iranian Advanced Persistent Threat (APT) group, likely Gray Sandstorm (also known as SEABORGIUM/COLDIVER). According to research from Check Point, the attacks targeted government and private sector entities in Israel and the United Arab Emirates (UAE) starting in early March 2026. The campaign's timing and choice of targets—specifically municipalities responsible for civil defense and damage response—strongly correlate with kinetic military operations (missile and drone strikes) launched by Iran. This suggests the cyberattacks were conducted as part of a hybrid warfare strategy, aimed at gathering intelligence to support and assess the impact of physical military actions.


Threat Overview

The campaign employed password spraying, a brute-force technique where attackers attempt a small number of common passwords against a large number of user accounts. This "low and slow" method is designed to avoid triggering account lockout policies that would occur from repeated failed logins on a single account.

The primary targets were Microsoft 365 accounts belonging to organizations in Israel and the UAE. The focus on municipalities is particularly notable. These organizations are critical for emergency response and damage assessment following a physical attack. By gaining access to their email accounts and internal documents, the attackers could potentially:

  • Gather intelligence on emergency response plans.
  • Assess the effectiveness and damage of their kinetic strikes (Bombing Damage Assessment - BDA).
  • Disrupt coordination efforts of first responders.

This direct correlation between cyber operations and physical military strikes is a clear example of hybrid warfare, where cyber capabilities are used as a force multiplier for conventional military action.

Technical Analysis

The core TTPs of this campaign are characteristic of Gray Sandstorm and other similar APTs focused on credential access:

Gray Sandstorm has a documented history of using password spraying as its go-to technique for initial access, making the attribution by Check Point highly plausible.

Impact Assessment

The impact of this campaign extends beyond a typical data breach, given its connection to military operations:

  • National Security Risk: The intelligence gathered could provide Iran with critical insights into the civil defense and response capabilities of its adversaries, directly impacting national security.
  • Espionage: The attackers gain access to sensitive government communications, plans, and data.
  • Foundation for Further Attacks: Compromised accounts can be used to launch more targeted phishing campaigns against other government entities or to maintain persistent access for future intelligence gathering.
  • Psychological Impact: Coordinated cyber and physical attacks are designed to create a sense of chaos and demonstrate a sophisticated, multi-domain capability.

Detection & Response

Detection:

  • Authentication Log Analysis: This is the most effective detection method. Ingest Microsoft Entra ID sign-in logs into a SIEM and monitor for password spray patterns. Look for a high volume of failed login attempts from a single or small group of IP addresses across many different user accounts. This is a key use case for D3-ANET: Authentication Event Thresholding.
  • Impossible Travel Alerts: Enable and monitor for impossible travel alerts, which trigger when a user account logs in from geographically distant locations in a short period.
  • Anomalous Mailbox Access: Monitor for unusual mailbox activity, such as a user account accessing the mailbox via an unfamiliar user agent or from an IP address outside of the organization's normal footprint.

Response:

  • If a password spray attack is detected, immediately force a password reset for all affected accounts.
  • Block the source IP addresses of the attack at the firewall or through Conditional Access policies.
  • Review mailbox rules and access permissions for any compromised accounts to identify and remove any persistence mechanisms set by the attacker.

Mitigation

  • Multi-factor Authentication (M1032 - Multi-factor Authentication): This is the single most effective defense against password spraying. Even if the attacker guesses the correct password, they cannot access the account without the second factor. Enforce MFA for all users.
  • Strong Password Policies (M1027 - Password Policies): Implement strong password policies that prohibit the use of common or easily guessable passwords. Use a deny-list of known bad passwords.
  • Conditional Access Policies: Implement Microsoft Entra Conditional Access policies to block or require MFA for logins from untrusted locations or non-compliant devices. This is a form of D3-UGLPA: User Geolocation Logon Pattern Analysis.
  • Audit and Logging (M1047 - Audit): Ensure that comprehensive logging is enabled for Microsoft 365 and that these logs are ingested into a SIEM for continuous monitoring and alerting.

Timeline of Events

1
April 2, 2026
This article was published

MITRE ATT&CK Mitigations

The most effective control to defeat password spraying. Even with a valid password, the attacker is stopped without the second factor.

Mapped D3FEND Techniques:

Enforce strong password requirements and use a password filter to block common and compromised passwords.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Continuously audit authentication logs to detect the patterns of a password spray attack.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To directly and effectively neutralize the threat from Gray Sandstorm's password spraying campaign, targeted organizations must enforce MFA for all Microsoft 365 accounts. A password spray attack's effectiveness is entirely nullified if a second factor is required for login. Even if the attacker correctly guesses a user's password, they are blocked from accessing the account. For high-value targets like government municipalities, it is crucial to use strong, phishing-resistant MFA methods such as FIDO2 security keys rather than SMS or simple push notifications. This single control is the most important defense against this TTP.

For detection, security teams must configure their SIEM to ingest Microsoft Entra ID sign-in logs and create specific rules to detect password spraying. A high-fidelity rule would be to alert when a single source IP address generates a high number of failed login attempts (e.g., >20) with the error code 50126 (InvalidCredentials) across multiple distinct user accounts (e.g., >10) within a short time frame (e.g., 5 minutes). This pattern is the classic signature of a password spray. Tuning these thresholds to your organization's baseline will provide an early warning of an attack in progress, allowing for rapid response such as blocking the source IP and forcing password resets.

Leverage Microsoft Entra Conditional Access to build policies that block or challenge authentication attempts from untrusted locations. For municipalities in Israel and the UAE, a policy could be created to block all authentication attempts originating from Iranian IP ranges. While attackers can use proxies, this provides a valuable layer of defense. More dynamically, use Entra ID's risk-based policies, which leverage Microsoft's threat intelligence to automatically detect and block logins from anomalous or suspicious locations, effectively automating the analysis of logon patterns and blocking attacks like those from Gray Sandstorm.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

password sprayGray SandstormIranAPTMicrosoft 365hybrid warfare

📢 Share This Article

Help others stay informed about cybersecurity threats