Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iran-Linked Cyber Attacks Target Israeli Microsoft 365

Iran-Linked Cyber Attacks Target Israeli Microsoft 365

Posted on April 6, 2026 By CWS

An Iranian-aligned cyber group is suspected of launching a password-spraying assault on Microsoft 365 systems in Israel and the United Arab Emirates amid ongoing regional tensions. This campaign, identified by Check Point, has been orchestrated over three attack phases on March 3, March 13, and March 23, 2026.

Impact on Organizations

Over 300 Israeli organizations and more than 25 in the U.A.E. have been affected by this cyber offensive, with additional targets observed in Europe, the United States, the United Kingdom, and Saudi Arabia. The attackers primarily targeted cloud infrastructures spanning government, municipal, technology, transportation, and energy sectors.

The password-spraying technique involves attempting a single common password across multiple accounts, making it an efficient method to exploit weak credentials without triggering security defenses. This method has been previously employed by Iranian groups such as Peach Sandstorm and Gray Sandstorm.

Technical Aspects of the Attacks

The operation follows a three-step process: initial scanning or spraying from Tor exit nodes, conducting login attempts, and extracting sensitive data like email contents. Check Point’s analysis indicates the use of tools similar to those of Gray Sandstorm, leveraging commercial VPN nodes, which align with recent Iranian activities in the Middle East.

Organizations are advised to scrutinize login logs for suspicious activities, implement conditional access controls, enforce multi-factor authentication, and maintain audit logs to facilitate investigations post-breach.

Revival of Pay2Key Operations

Concurrently, Pay2Key, an Iranian ransomware group, has resurfaced, targeting a U.S. healthcare entity in February 2026. This attack marks an evolution from their previous campaigns, employing advanced evasion and anti-forensics techniques. Despite these advancements, no data was extracted during the incident, indicating a departure from their traditional double extortion strategy.

The attackers infiltrated the system via an unknown access point, using legitimate remote access tools to gain entry, disable Microsoft Defender, and deploy ransomware. Notably, the group has increased affiliate profit shares to incentivize attacks against Iran’s perceived adversaries, reflecting a strategic shift.

In March 2026, the Sicarii ransomware administrator encouraged the use of Baqiyat 313 Locker, targeting the U.A.E., the U.S., and Israel. These cyber operations highlight Iran’s continued use of digital tactics in geopolitical conflicts, blurring the lines between criminal and state-sponsored actions.

The evolving nature of these cyber threats underscores the need for comprehensive security measures and international cooperation to mitigate risks and protect critical infrastructures.

The Hacker News Tags:Check Point, cyber threats, Cybersecurity, Hacking, Iran, Israel, Microsoft 365, Middle East, password spraying, Ransomware

Post navigation

Previous Post: North Korean IT Worker Exposed by Unusual Interview Tactic
Next Post: ILSpy Site Hacked, Spreads Malware to Developers

Related Posts

Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More The Hacker News
Cybersecurity Focus Risks Overlooking Basics Cybersecurity Focus Risks Overlooking Basics The Hacker News
Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account The Hacker News
New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack The Hacker News
China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil The Hacker News
SaaS Breaches Start with Tokens SaaS Breaches Start with Tokens The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ILSpy Site Hacked, Spreads Malware to Developers
  • Iran-Linked Cyber Attacks Target Israeli Microsoft 365
  • North Korean IT Worker Exposed by Unusual Interview Tactic
  • Malicious PyPI AI Tool Steals Data via Trojanized Proxy
  • North Korean Hackers Exploit GitHub in South Korea Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ILSpy Site Hacked, Spreads Malware to Developers
  • Iran-Linked Cyber Attacks Target Israeli Microsoft 365
  • North Korean IT Worker Exposed by Unusual Interview Tactic
  • Malicious PyPI AI Tool Steals Data via Trojanized Proxy
  • North Korean Hackers Exploit GitHub in South Korea Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark