Demo Request
Take a personalized product tour with a member of our team to see how we can help make your existing security teams and tools more effective within minutes.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Home
Blog

Global Campaign Targeting SaaS Identities: Attack Analysis

Dvir Sasson
Updated
February 7, 2025
July 16, 2025
6 minutes
Ready to Close the SaaS Security Gap?
Chat with us

Technical Report: Identity Attacks Analysis

Over the last month, Reco witnessed a specific, semi-automated, global campaign originating from Phoenix, Arizona, primarily targeting authentication systems such as Azure Active Directory, Okta, and Office 365. While we were able to trace it back to November 2024, we believe this campaign is still ongoing and have established controls to alert and detect these attacks on customer environments.

The attacks originated from a limited set of ASNs and IP addresses, with a strong correlation to VPN and proxy usage. This analysis identifies attack patterns, attacker infrastructure, targeted accounts, and security measures that prevented or allowed account takeovers.

Key Findings

Attack Trends Over Time

  • The attacks were not random; they occurred in spikes, indicating coordinated efforts rather than opportunistic attempts.
  • Peak attack periods aligned with working hours in targeted regions, suggesting human-operated attack waves rather than fully automated botnets.
  • The total number of attempts is not staggering, meaning the threat actors behind this campaign are attempting to perform slow Credentials Stuffing.
  • The IP’s in question are in fact linked to known Phishing techniques, using known frameworks, such as Evilginx2 (AiTM - more info here).

Most Active ASNs & IPs

  • Attacks originated from a few highly active ASNs:
    • Global Connectivity Solutions LLP - AS215540 (Repeated use in attacks)
    • Global Internet Solutions LLC - AS207713
  • Top Attacker IPs:
    • 212.18.104.5 
    • 2a05:541:116:4::1 
    • 2a00:b703:fff2:41::1 
    • 2a00:b703:fff2:42::1 

Top Targeted Applications & Services

  • Azure Active Directory – Primary target, likely for credential stuffing and account takeover attempts.
  • Okta – Secondary focus, indicating interest in cloud authentication.
  • Office 365 – Email-based attacks targeting Exchange Online.
  • Microsoft Teams – Less frequent, but shows interest in corporate collaboration tools.

Attack Success vs. Failure Rates

  • High number of failed attacks, largely due to MFA enforcement and rate-limiting protections.
  • Successful attacks were observed, meaning some accounts either lacked MFA, had weak credentials, or were accessed via session hijacking.

Attack Geolocation Trends

  • Attacks were concentrated in a few high-risk regions.
  • VPN and proxy usage was common, indicating attempts to obfuscate true attacker locations.

Attack Sequences & Behavior

  • Credential stuffing detected – repeated failed logins before a successful attempt.
  • MFA Challenges:
    • No direct MFA bypass observed, but multiple failed MFA attempts indicate resistance.
    • Attackers switched IPs and devices after failures, indicating manual intervention.
  • User Agents:
    • A mix of desktop browsers (Chrome, Firefox, Edge) and mobile logins (iOS, Android).
    • Some anomalies included headless browser activity, suggesting automation.

VPN & Proxy Usage

  • Hosting providers were heavily used – attackers avoided residential ISP connections.
  • Attacks via VPNs had lower success rates, suggesting they were blocked or detected.
  • Some ASN-linked IPs showed repeated failures, likely flagged by security systems.

Indicators of Compromise (IOCs)

User Agents involved:

  • Axios/1.7.9
  • BAV2ROPC 
  • Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
  • Accountsd/113 CFNetwork/1568.200.51 Darwin/24.1.0 

Attack Timings

  • Peak attack hours: Aligned with corporate login windows in targeted regions.
  • Rapid attempts within 5-minute intervals, suggesting automation, used with “axios/1.7.9”.

Observed Attack Methods

  • Credential stuffing (multiple failed logins, followed by a success).
  • MFA abuse (repeated MFA attempts, but no direct bypasses recorded).
  • Session hijacking success, with users confirming sign-ins in some instances, resulting in an account takeover.

Recommendations

  • Strong, Mandatory MFA such as FIDO2 and Passkeys are to be enforced across all accounts.
  • Conditional Access Policies and and IP blocking are key for preventing attacks originating from unknown locations, including alerting when a threshold of failed sign in has increased.
  • Increase visibility into headless browser logins, as they indicate automation.

What to do if Compromised

  1. Block IP range entirely: use your firewall or security tools to block access from the identified IP to prevent further intrusion
  2. Investigate the origin: Review logs and any associated activity from the flagged IP to understand the nature of access (e.g. time of access, attempted resources).
  3. Isolate Affected Accounts: If the malicious IP accessed any accounts, temporarily suspend those accounts and require password resets.

How Reco Can Help

Reco uses identity threat detection and response (ITDR) to monitor for unusual behavior across SaaS application identities. It surfaces real-time alerts when signs of compromise are detected. Reco will flag suspicious activity, like excessive downloads by a suspicious IP, unusual snooping on categorized data, or impossible travel. The alerts will be surfaced through your SIEM or SOAR so your Security team can act immediately.

Reco alert on MITB Campaign

Interested in securing your SaaS with Reco? Schedule a demo today.

No items found.

Dvir Sasson

ABOUT THE AUTHOR

Dvir is the Director of Security Research Director, where he contributes a vast array of cybersecurity expertise gained over a decade in both offensive and defensive capacities. His areas of specialization include red team operations, incident response, security operations, governance, security research, threat intelligence, and safeguarding cloud environments. With certifications in CISSP and OSCP, Dvir is passionate about problem-solving, developing automation scripts in PowerShell and Python, and delving into the mechanics of breaking things.

Technical Review by:
Gal Nakash
Technical Review by:
Dvir Sasson

Dvir is the Director of Security Research Director, where he contributes a vast array of cybersecurity expertise gained over a decade in both offensive and defensive capacities. His areas of specialization include red team operations, incident response, security operations, governance, security research, threat intelligence, and safeguarding cloud environments. With certifications in CISSP and OSCP, Dvir is passionate about problem-solving, developing automation scripts in PowerShell and Python, and delving into the mechanics of breaking things.

Ready to Close the SaaS Security Gap?
Chat with us
Table of Contents
Get the Latest SaaS Security Insights
Subscribe to receive updates on the latest cyber security attacks and trends in SaaS Security.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Explore Related Posts

Malicious Extensions That Lock You Out While They Steal Your Session
Dr. Tal Shapira
Five malicious Chrome extensions disguised as enterprise productivity tools stole session tokens from Workday, NetSuite, and SuccessFactors while simultaneously blocking admins from revoking access or resetting credentials. The attack exposed a blind spot in SaaS security: the browser, where stolen session cookies render SSO and MFA irrelevant.
Why the Hidden Cost of AI Sprawl Is Rising in Modern Enterprises
Gal Nakash
AI adoption is accelerating across modern enterprises, but the rapid growth of AI tools and agents often introduces hidden operational and security risks. This article explores the hidden cost of AI sprawl, including duplicate tools, fragmented workflows, and expanding SaaS integrations. It also outlines practical frameworks and best practices that help organizations detect uncontrolled AI adoption and maintain visibility, governance, and security across enterprise environments.
Model Context Protocol (MCP) Is Rewiring SaaS Trust, One Agent Action at a Time
Gal Nakash
The Model Context Protocol (MCP) is an emerging standard that enables AI agents to seamlessly connect with SaaS tools and APIs, allowing them to perform actions like fetching files, updating records, and sending messages autonomously. However, this power introduces significant security risks, including identity drift, weak authentication, data leakage, and invisible access that bypasses traditional monitoring. Organizations can mitigate these risks by enforcing least-privilege OAuth scopes, using short-lived tokens, binding agents to human owners, and adopting platforms that provide continuous visibility into MCP-based trust paths.
See more featured resources

Ready for SaaS Security that can keep up?

Request a demo