Like the title says, I’ve got yesterday an email with a code to access my Microsoft account and that made me suspicious because I wasn’t trying to login to my account. When I looked at the login attempts I saw that someone else was trying to access my account, I changed my password, activated TFA. Thinking of going through and buying a physical key like yubico to further secure my account. Any tips are appreciated.

49 points

PSA: you can add mail aliases for outlook and set one of the new aliases as your only valid login address. That way no one knows your login email address in the first place.

permalink
report
reply
4 points

What a great tip. Thanks!

permalink
report
parent
reply
19 points

Happened to me too yesterday. Gave me a big bump to my evening plans. Luckily I too have 2fa activated via 2 different systems {SMS AND second Mail address). They cracked my randomly generated password - which doesn’t surprise me that much, brute force cracker are pretty effective nowadays.

What bums me is that I used this as an argument to teach a friend but he just used the same ol’ reliable “naah, I’m too lazy”. Can’t change him, just told him to think about using 2fa everywhere money is involved. The rest is up to him.

What’s also pretty bad from MS is that yes you can use several different mailadresses but no you can’t prevent that all of them can be used as login. One is compromised but also used for mail traffic so I can’t just delete it. But also can’t prevent it from logging in to the account. Thanks MS…

permalink
report
reply
45 points

They cracked my randomly generated password - which doesn’t surprise me that much, brute force cracker are pretty effective nowadays.

I’m actually surprised that it’d be feasible to use a brute force approach to gain access to an online account. I would expect them to hit some kind of rate-limiting long before they’d find the correct password

permalink
report
parent
reply
15 points
*

Brute force attacks are usually done offline, where the attacker somehow gets a copy of a database of hashed passwords and they can take as many attempts as they want locally before they get a hit and can try it online.

permalink
report
parent
reply
3 points

Looking at my history, they’re hours or a day apart. Probably no chance of getting into any halfway decent password that way, but if they can automate it with thousands of different email addresses, eventually they’d get an account with a weak password and get in.

permalink
report
parent
reply
10 points

I appreciate when commenters end their first paragraph with bullshit so you don’t have to read any farther. I’d love to hear how you think they cracked your randomly generated password via brute force against Microsoft.

permalink
report
parent
reply
8 points
*

Hey so you actually can make it so an email address doesn’t log into the account, it’s how I stopped one particularly persistent hacking attempt when they finally managed to crack my password but were stopped by 2fa. Go to your profile > account info > sign in preferences, then as long as you have an alias email on the account you can deselect ones that you don’t want to be able to be used as a log-in.

permalink
report
parent
reply
3 points

With Microsoft I couldnt figure out how to enable 2fa against minecraft. Seems they do not have 2fa of any kind there and that is linked to your microsoft account. I guess the permissions there are just for minecraft, but if I was a betting man, I would venture there is a big hole there.

permalink
report
parent
reply
0 points

Oh, really?! Okay gonna try that, thanks for the Tipp!

permalink
report
parent
reply
4 points

What kind of randomly generated password did you have that was crackable? I usually use 30 characters completely random string. If that’s crackable, maybe I need to rethink things.

permalink
report
parent
reply
1 point

Stupidly just 12 random characters. I was too naive and hoped that’ll be it.

permalink
report
parent
reply
19 points

What you need to realize is that for Microsoft, these attacks are constant. They deal with them basically 24/7/365. The target might change, but the attacks never stop.

Between Hotmail, Outlook, and exchange online (365) they’re handling a large number of attacks per second all the time.

If they started to inform you about it, they would easily triple the emails they’re handling due to all the failure messages.

This is nothing new to them, it’s been going on since long before you noticed. Any MFA will effectively stop any attacker in their tracks. Make sure you have changed your password since you got that code sent to you, since that usually indicates a successful password breach.

Yubikeys are a good idea but you should always have a backup, so if you can afford it, buy two. One to carry, one to use. The downside is that each needs to be enrolled separately to each service that they’re used for. It’s not an issue to have multiple keys associated to the account, so that would be my recommendation.

I have a yubikey for work, and I use TOTP as a backup, and personally, I have a pair of Google Titan security keys. One to carry and one to stay at home.

permalink
report
reply
17 points
*

This has been happening with my original MS email account for years. It’s been in so many data breaches and pwns over the years that I basically have abandoned it. It’s constantly being probed by malicious actors from outside the US. I still keep it for when family reaches out, otherwise I’d close the account.
There’s no real way to block the attempts. Make sure your password is rock solid (randomize and store it in a password manager) and unique, put on 2FA, and ensure your recovery methods aren’t easily phishable/leakable.

permalink
report
reply
5 points

Same, since it’s a ms account I have a ton of stuff linked to it and can’t simply close it. You can change your login email, as far as I can tell you still get the emails that were sent to the old address, just moving forward what you sign in with is different. That slowed it down a little bit for me.

permalink
report
parent
reply
3 points

That’s good to know. I’ll give it a shot setting up another alias but still keeping the address functional

permalink
report
parent
reply
12 points

As long as you have 2Fa setup via a yubikey or phone app, and it via sms or email, you should be fine, they will give up eventually.

permalink
report
reply

techsupport

!techsupport@lemmy.world

Create post

The Lemmy community will help you with your tech problems and questions about anything here. Do not be shy, we will try to help you.

If something works or if you find a solution to your problem let us know it will be greatly apreciated.

Rules: instance rules + stay on topic

Partnered communities:

You Should Know

Reddit

Software gore

Recommendations

Community stats

  • 251

    Monthly active users

  • 342

    Posts

  • 2.3K

    Comments

Community moderators