Password spraying is not new. It is a low and effective tactic that nation state actors have used alongside phishing and supply chain techniques to pry open high-value targets, including cloud and email environments. Defenders should treat password spraying as a persistent reconnaissance and foothold method rather than a one-off nuisance.
Russia-linked actors such as NOBELIUM have repeatedly combined simple credential attacks with more complex follow-on techniques to escalate access and harvest intelligence. Public reporting and Microsoft threat research documented NOBELIUM operations that included password spraying as part of a multi-stage effort to compromise accounts, discover privileged relationships, and extend access through delegated privileges. That pattern makes login hygiene a strategic defensive priority for organizations protecting senior leadership, especially military communications where sensitive operational intent can be exposed.
What makes military leadership communications uniquely vulnerable
1) Concentration of value. Accounts belonging to senior leaders, legislative liaisons, and operational staff have rich collections of contacts, calendars, policy drafts, and operational summaries. Compromise of even a single mailbox can enable pivoting and targeted follow-on attacks.
2) Legacy and test accounts. Older, nonproduction tenants, service accounts, and forgotten admin delegates are common weak links. Adversaries deliberately probe these less-secured identities because they often lack modern protections like multifactor authentication. Securing or decommissioning these assets must precede any other work.
3) Federated and OAuth trust. Modern cloud platforms rely on federated identity and third-party app consent. Attackers who control a compromised account can abuse existing OAuth apps or register malicious applications to read mailboxes or escalate privileges. Tight governance around app consent is essential.
Five practical defenses to prioritize now
1) Enforce phishing resistant multifactor authentication for all leadership and privileged accounts. MFA that uses phishing-resistant mechanisms such as hardware security keys or platform-bound authenticators materially reduces the chance a sprayed password will yield access. Passwords alone remain vulnerable and are explicitly called out in NIST guidance as insufficient when used as a single factor. Require and verify strong second factors for every route into mail and collaboration platforms.
2) Close or harden legacy, test, and shared accounts. Inventory every tenant, test environment, service account, and developer sandbox that has access to production directories or mail. Remove permissions that are not strictly required. Where decommissioning is not yet possible, require MFA, reset credentials, and enforce conditional access so these accounts cannot be used from unexpected locations. Attackers exploit overlooked identities before targeting well-defended admin accounts.
3) Lock down OAuth and third-party application consent. Implement explicit allowlists for OAuth app permissions, require admin approval for any app requesting mailbox or directory scopes, and review existing app registrations for excessive privileges. Monitor app creation events and abnormal consent patterns. Attackers often move from a single compromised account to broad read access by abusing app permissions.
4) Detect distributed authentication anomalies and tune telemetry. Password spraying is a distributed, low-and-slow pattern. Build detections that correlate failed authentications using the same password across many accounts, repeated attempts from residential proxy networks, or spikes in authentication failures targeted at sensitive groups. Feed these signals into a rapid response playbook that includes credential resets, token revocation, and targeted endpoint hunts. MITRE and government guidance outline behaviors and logging points you should instrument now.
5) Adopt least privilege and segmentation for leadership comms. Separate leadership communications systems from general user mail and development/test tenants. Where feasible, place leadership mailboxes and collaboration tools behind stronger conditional access policies and dedicated device management. Segmenting reduces the blast radius if an account is compromised and forces the attacker to overcome additional barriers before reaching operational artifacts.
Operational practices and policy changes that matter
-
Mandate password length and blocklists rather than archaic complexity rules. Use guidance consistent with NIST to allow long passphrases, block known compromised passwords, and avoid forced periodic rotation unless compromise is suspected. This improves user behavior while reducing predictable passwords attackers spray.
-
Treat identity protection as a live program. Continuous validation of conditional access policies, frequent audits of delegated privileges, routine cleanup of app registrations, and red team exercises that include password spray scenarios will find gaps before adversaries do. Microsoft and other industry trackers have repeatedly observed that nation-state actors combine simple brute force with sophisticated follow-on techniques. Practice catching the first step.
-
Harden incident response for leadership compromise. Create a rapid isolation and revocation playbook specific to senior accounts. Steps should include immediate revocation of refresh tokens, forced reauthentication with phishing-resistant MFA, mailbox export and analysis, rapid patching of any endpoints used to access sensitive mailboxes, and coordinated disclosure channels for stakeholders. Time matters. Early containment prevents lateral expansion.
Concluding guidance
Password spraying exploits human and operational friction more than technical exoticness. For military leadership communications the priority is to remove inexpensive and remediable attack surface: enforce phishing-resistant MFA, inventory and secure forgotten accounts and test tenants, lock down app consent, and instrument detections tuned to low-and-slow authentication abuse. These steps are not theoretical. They are the practical controls that repeatedly blunt nation-state operators and buy time to respond when adversaries change tactics. Implement them now, test them regularly, and assume the adversary will probe the weakest link first.