I love posts that come directly from the trenches because they highlight the real operational reality behind the scenes. This time, we are sharing insights from one of our research projects focused on a specific campaign.
This post presents a comprehensive 90-day analysis of identity attacks, such as password spraying, brute force, and other activities observed across Entra ID from December, 2025 through March 2026, covering three geographic regions: the United States, the European Union, and Australia. The analysis encompasses more than 45 million authentication events, revealing a sustained, coordinated, multi-source credential attack campaign that operated continuously for the entire observation period.
Attack Volume and Trends
Authentication telemetry over the 14-week observation window indicates a sustained, high-volume brute-force campaign with stable, predictable weekly patterns. US-sourced wrong-password events consistently plateaued between approximately 570,000 and 637,000 per week from late December through early March, translating to an average rate of ~59 failed authentication attempts per minute on a continuous, 24/7 basis.
No Slack account needed.
Password Spray Velocity
The stepped area chart above illustrates the ‘always-on’ nature of this campaign. The velocity remained above the 50 failures/minute danger threshold for 12 consecutive weeks. The dramatic cliff drop in the week of March 16 represents an 83% reduction, from a 12-week average of approximately 61 failures/minute to just 10.8 failures/minute. The peak of 63.4/minute was observed in the week of March 9.

Attack traffic rapidly escalates from an initial baseline to a sustained plateau ranging between ~55–63 attempts per minute, consistently exceeding the defined alert threshold (50/min). This sustained elevation indicates automated password spraying activity rather than opportunistic or manual attempts.
The campaign demonstrates operational stability and controlled execution, with minimal fluctuation over multiple weeks, suggesting the use of distributed infrastructure and rate-limiting evasion techniques to remain below hard lockout thresholds while maximizing coverage.
Notably:
- The attacker maintains persistent pressure within a narrow velocity band, indicative of credential stuffing or password spraying tooling configured for stealth and longevity
- Activity remains continuously above the detection threshold, signaling ongoing exposure and elevated risk to account security
- A sharp drop-off near the end of the timeline likely reflects campaign termination, infrastructure rotation, or temporary throttling following detection or mitigation actions
Overall, the pattern aligns with a long-running, low-and-slow authentication attack campaign optimized for evasion, scale, and persistence, rather than short-lived brute-force spikes.
Cross-Region Attack Volume
The US region remained the primary attack surface, consistently accounting for ~80% of total observed authentication events across all regions, indicating concentrated adversary focus and infrastructure targeting.
In contrast, EU telemetry exhibited a distinct behavioral pattern, where lockout events significantly outpaced wrong-password attempts, suggesting a divergent attack methodology, likely credential stuffing leveraging higher-confidence credential sets that increase lockout frequency. Meanwhile, AU activity, although comparatively low in volume, demonstrated a gradual escalation through February before tapering off in March, potentially indicating opportunistic targeting or spillover from broader campaign infrastructure.

This cross-region authentication attack volume reveals clear priorities for adversary targeting.
- The US consistently dominates activity, indicating that it is the campaign’s primary focus.
- EU activity remains lower but shows a steady increase, suggesting gradual expansion or adaptive targeting.
- AU maintains the lowest volume, with a similar upward trend before declining.
The synchronized growth across regions points to coordinated infrastructure and distributed execution. The sharp drop at the end likely reflects campaign disruption, infrastructure rotation, or mitigation efforts impacting attacker operations.
Account Lockout Trends
Account lockouts are a lagging indicator of password spray intensity. US lockouts peaked at 257,764 in the week of March 2, the highest weekly lockout count in the observation period, corresponding to organizational accounts being cycled through attacker password lists.
EU lockouts showed a dramatic escalation from a baseline of approximately 30,000/week to a peak of 127,989 in the week of March 16, suggesting a secondary spray campaign that intensified as the US campaign wound down. This is a significant finding: the EU lockout surge beginning in late February may represent a coordinated handoff or parallel campaign by the same threat actor.

The lockout trends indicate a high-risk authentication attack campaign with measurable user impact and potential exposure to account compromise. The sustained and increasing lockout volumes, particularly in the US region, suggest effective password spraying or credential stuffing activity reaching lockout thresholds at scale, increasing the likelihood of successful account access attempts within the same campaign.
Note: This does not include account lockouts caused by user actions or IT-related issues.
Password Spray Infrastructure Analysis
Analysis of the IP addresses responsible for spray activity reveals a highly distributed botnet infrastructure spanning 25+ countries. The geographic diversity, combined with the coordination in targeting patterns, is consistent with a professional threat actor renting or controlling a proxy/VPS network, or leveraging a commercially available credential testing service.

Every IP in the top 20 carries an AbuseIPDB score of 100/100 and achieved zero successful authentications — confirming these are purely spray sources without direct compromise capability. The top IP (87.103.126.54, Portugal) targeted 1,856 unique users, approximately 1.8x as many as the 20th-ranked IP. The 103.x.x.x South African IP cluster (102.53.15.17, .18, .56) targeting 3,457 users combined suggests a sub-region within the botnet assigned specifically to African exit nodes.
Attack Geographic Distribution
South Korea dominates the spray infrastructure with 18 unique IPs, all originating from KT (Korea Telecom), South Korea’s largest ISP. This concentration on a single ISP suggests either a specific targeting of Korean infrastructure or that KT’s network is commonly exploited for residential/business proxy abuse. China contributes 10 IPs across China Unicom (6), China Telecom (2), and China Mobile (2).

ISP Concentration Analysis

Attack Protocol Analysis
The attack protocol distribution, with BAV2ROPC dominating at 78%, indicates primary adversary reliance on non-interactive authentication flows. This method is notable for bypassing legacy MFA and Conditional Access controls, significantly increasing the risk of account compromise.
Interactive browser activity accounts for 10%, while other protocols remain minimal. The heavy concentration on BAV2ROPC suggests deliberate attacker optimization for stealth, scalability, and control evasion within identity infrastructure.

BAV2ROPC Deep Dive
BAV2ROPC (Basic Authentication Version 2, Resource Owner Password Credentials) is a legacy OAuth 2.0 flow that transmits credentials directly to Microsoft’s authentication endpoint. Unlike interactive browser-based authentication, ROPC flows bypass many security controls, including device compliance checks, location-based Conditional Access, and some MFA enforcement mechanisms.
The BAConsumerV2ROPC variant was also observed, targeting consumer Microsoft accounts using the same bypass technique. Together, these two ROPC variants accounted for approximately 80% of all spray attempts observed in this analysis.

Behavioral Indicators

Entra ID Error Code Reference

Failures Per Minute Analysis
This chart shows the average number of failed authentications per minute across all three operational regions over the full 90-day observation period. The metric is calculated by dividing total daily failures (invalid credentials + account lockouts) by 1,440 minutes per day.

- Peak velocity of 135 failed authentications per minute (combined) occurred on March 14, 2026, driven by a massive US-region spray surge that generated 170,957 total failures in a single day (118.7 fails/min in the US alone). This represents one failed authentication attempt every 0.44 seconds.
- The campaign maintained a sustained baseline of 75-90 combined fails/min from December 2025 through mid-March 2026 (83 consecutive days). This consistency across weekends and holidays confirms a fully automated, 24/7 botnet infrastructure with no human operator involvement.
- The dramatic cliff on March 16 saw US failures drop from 74/min to 36/min overnight, cutting the combined rate in half. However, EU failures simultaneously surged from a baseline of ~7/min to 17-19/min, suggesting a partial infrastructure migration from the US to the EU target.
- The severity color coding in the bottom panel shows the US region spent 79 of 90 days (88%) above the ELEVATED threshold (60 fails/min), and only dropped below MODERATE (40 fails/min) after the March 16 campaign shift. The current rate of ~31 combined fails/min still exceeds healthy baselines.
A secondary spike in February (104 combined fails/min) preceded the main surge and may have represented a test run or a target list refresh by the spray campaign operator. The Jan spike (88/min) follows the same pattern.
MSP Angle: Multi-Tenant Risk at Scale
For Managed Service Providers (MSPs), campaigns like this introduce amplified risk due to the multi-tenant nature of identity infrastructure. A single coordinated credential attack does not target one environment. It scales horizontally across multiple tenants, increasing both exposure and potential impact.
The sustained volume and distribution observed in this campaign indicate that attackers are systematically targeting identities across managed environments. Weak configurations, inconsistent MFA enforcement, or legacy authentication gaps in a single tenant can serve as entry points while remaining hidden amid high authentication noise.
Protocols such as BAV2ROPC further complicate defense by enabling authentication flows that bypass traditional Conditional Access and MFA protections, reducing the effectiveness of standard security baselines.
Operationally, this results in increased alert fatigue, an elevated risk of credential reuse across tenants, and detection challenges as attack traffic blends with legitimate activity.
Tips for MSPs
- Adopt Phishing-Resistant Authentication with Passkeys: Standardize on passkeys and FIDO2-based authentication across all tenants to eliminate phishing and significantly reduce the risk of credential theft, especially for privileged and external access.
- Minimize Blast Radius by Design: Architect environments to limit impact through least privilege, role segmentation, Just-In-Time (JIT) access, and strict administrative boundaries, containing compromise within isolated scopes.
- Eliminate Password Dependency: Transition to passwordless or password-minimized authentication models to neutralize password spraying and credential stuffing attack vectors.
- Leverage Identity Threat Detection and Response (ITDR): Deploy advanced identity-focused detection that correlates behavioral signals to identify attacker techniques such as token abuse, anomalous access patterns, and stealthy persistence.
- Standardize Security Baselines: Ensure consistent Conditional Access, password policies, and monitoring configurations across all tenants.
Closing
This campaign reinforces a critical reality: identity has become the primary battleground. The scale, persistence, and coordination observed over these 90 days highlight how adversaries are optimizing for stealth, longevity, and success against modern authentication systems. Defenders must assume continuous exposure and adapt accordingly by strengthening controls, visibility, and resilience across identity infrastructure.
Resources
Discover more tools, scripts and tips in the Security Research Labs