I sure don’t feel safe just ignoring it, considering the frequency.

126 points
*
Deleted by creator
permalink
report
reply
47 points

The message is multi-factor

permalink
report
parent
reply
11 points
*

Oh, I missed that in the gutter of the message.

This is a common attack tactic, then, called MFA Fatigue. It also means they probably have Ops password already. Or Ops service provider is doing something dumb. (MFA requests shouldn’t be sent out without the other factor being known.)

Edit: There’s no approve link there. Just ignore these. If you got a lot of these, do setup MFA.

permalink
report
parent
reply
3 points

It’s not mfa fatigue. MS sends a code to the email. There is no accept or deny in the email.

permalink
report
parent
reply
1 point
Deleted by creator
permalink
report
parent
reply
89 points
*

It’s common for people to get these when their email address is similar to my dad’s and he forgets his password again.

permalink
report
reply
28 points

Part of my concern is the email has part of an uncommon spelling of name + some numbers. And that it started all of a sudden, every day. The email is several years old and only now it’s begun happening every day.

permalink
report
parent
reply
38 points

I hope you’ve turned on 2FA.

permalink
report
parent
reply
9 points
*

FYI, the emails the OP are getting are the 2FA Time-based One-Time Password (TOTP). So OP in fact does have 2FA enabled. 😊

Ps. I’m not being sarcastic.

Never mind. I misunderstood what the email was being sent for. My apologies.

permalink
report
parent
reply
13 points

Create an email alias and use it as the account address.

permalink
report
parent
reply

Have you been pwned?

https://haveibeenpwned.com/

There’s been some new and ginormous data dumps recently.

Maybe it is your time.

permalink
report
parent
reply
86 points

Change your password immediately to something you’ve never used before and isn’t similar to current passwords. If you’re getting random 2fa codes, someone is able to complete your first factor, so fix that ASAP.

permalink
report
reply
18 points

It might not be 2-factor. Microsoft has an option to log in via email code, which doesn’t need a password.

permalink
report
parent
reply
10 points

I had the same issue as OP, spoke to Microsoft who said I didn’t need to change my password. I think these are sent before the password is confirmed.

permalink
report
parent
reply
1 point
Deleted by creator
permalink
report
parent
reply
39 points

It is actually safe to ignore them. It means either someone has an email address similar to yours, or a bot of some sort has you email address and only your email address.

Essentially, someone or something goes to the login screen, enters your login, and says “I don’t have the password, let me in!”.
Sending a code to your email like this is the first step in letting someone in without the password, or more specifically to having them reset it.

Since the email is to check “did you ask for this?”, doing nothing tells them that you did not.

If you want some extra peace of mind: https://account.live.com/Activity should show you any recent login activity which you can use to confirm that no one has gotten in.

Also, use two factor, a password manager, and keep your recovery codes somewhere safe. The usual security person mantra. :)

permalink
report
reply
29 points
*

This is all good information and seems well intentioned, but it’s worth pointing out in a post about account security that clicking links provided by others and giving it your login information is very unwise (even/especially links in emails like these). For the link you provided, it’d be better to recommend going through a primary microsoft page or login that can be confirmed by the user and getting to the activity history page from there

permalink
report
parent
reply
9 points

That is wonderful advice and I’m glad you pointed that out. :)

If I knew how to give directions to the page, I would, but unfortunately I don’t know the Microsoft site layout, only the URL that their help center directed to.

In mitigation of my indiscretion: it’s generally safer to trust a person you approach out of nowhere than to trust someone who approaches you out of nowhere.
Since they chose the venue and asked the question, the likelihood that an attacker is present in the replies is lower than the expectation that an unsolicited email is from an attacker.

But it’s also entirely correct to be distrustful of anything anyone asks you to click on, triply so if it involves security or login pages.

permalink
report
parent
reply
2 points

For MS guides there usually is an article under support.microsoft.com or learn.microsoft.com (usually more advanced, admin related documentation for company / enterprise level stuff) domains. Here’s an article for checking activity.

permalink
report
parent
reply
9 points

Also, use two factor, a password manager, and keep your recovery codes somewhere safe. The usual security person mantr

Well, I found the recent activity and none of these were me. At least they all appear to say Unsuccessful sign-in.

permalink
report
parent
reply
12 points
*
Deleted by creator
permalink
report
parent
reply
1 point
*

FWIW Microsoft does a blind token here meaning they send it if your password is correct or not.

In that way the person attempting to gain access has no context of if the password is correct or not

permalink
report
parent
reply
8 points

Yup, that would indicate that likely a bot is trying to guess it’s way in.

You are still safe.

The only weird thing here is that Microsoft lets such things bother you instead of guessing that you didn’t teleport to Brazil and instead putting a little extra burden on the Brazil end before sending you an email.

If you’re still feeling worried, the biggest thing you can do is enable two-factor auth (which you should do anyway), or even better: enable something like passkeys which are very secure and also easier than username/password.

Two-factor/password manager is the “remember to brush and floss” of the security industry, so… Please do those things. :)

permalink
report
parent
reply
4 points

Considering most of the attempts are from India and Brazil I suspect a service you signed up for has sold your email to unsavory data brokers and now a bunch of scam companies are doing that MFA attack on you

permalink
report
parent
reply
3 points
*

You can create an email alias for your Microsoft account and then only enable login from that account. If you then do not use that email for anything but the login, you should be pretty safe from credential stuffing attacks.

I had a very similar issue with multiple failed login attempts and changing my login email stopped it right away.

permalink
report
parent
reply
34 points

I would definitely changw your password, also see if you can check the logs of login as it will sometimes show and you can see if the country aligns.

For what its worth, if you think youre not being hacked. It sometimes ive seen it come up when people use a vpn and are connected by some sort of app. And it flags a 2fa to reconect. Its unlikely but i have seen it.

permalink
report
reply

Mildly Infuriating

!mildlyinfuriating@lemmy.world

Create post

Home to all things “Mildly Infuriating” Not infuriating, not enraging. Mildly Infuriating. All posts should reflect that.

I want my day mildly ruined, not completely ruined. Please remember to refrain from reposting old content. If you post a post from reddit it is good practice to include a link and credit the OP. I’m not about stealing content!

It’s just good to get something in this website for casual viewing whilst refreshing original content is added overtime.


Rules:

1. Be Respectful

Refrain from using harmful language pertaining to a protected characteristic: e.g. race, gender, sexuality, disability or religion.

Refrain from being argumentative when responding or commenting to posts/replies. Personal attacks are not welcome here.


2. No Illegal Content

Content that violates the law. Any post/comment found to be in breach of common law will be removed and given to the authorities if required.

That means: -No promoting violence/threats against any individuals

-No CSA content or Revenge Porn

-No sharing private/personal information (Doxxing)


3. No Spam

Posting the same post, no matter the intent is against the rules.

-If you have posted content, please refrain from re-posting said content within this community.

-Do not spam posts with intent to harass, annoy, bully, advertise, scam or harm this community.

-No posting Scams/Advertisements/Phishing Links/IP Grabbers

-No Bots, Bots will be banned from the community.


4. No Porn/Explicit

Content


-Do not post explicit content. Lemmy.World is not the instance for NSFW content.

-Do not post Gore or Shock Content.


5. No Enciting Harassment,

Brigading, Doxxing or Witch Hunts


-Do not Brigade other Communities

-No calls to action against other communities/users within Lemmy or outside of Lemmy.

-No Witch Hunts against users/communities.

-No content that harasses members within or outside of the community.


6. NSFW should be behind NSFW tags.

-Content that is NSFW should be behind NSFW tags.

-Content that might be distressing should be kept behind NSFW tags.


7. Content should match the theme of this community.

-Content should be Mildly infuriating.

-At this time we permit content that is infuriating until an infuriating community is made available.


8. Reposting of Reddit content is permitted, try to credit the OC.

-Please consider crediting the OC when reposting content. A name of the user or a link to the original post is sufficient.


Also check out:

Partnered Communities:

1.Lemmy Review

2.Lemmy Be Wholesome

3.Lemmy Shitpost

4.No Stupid Questions

5.You Should Know

6.Credible Defense


Reach out to LillianVS for inclusion on the sidebar.

All communities included on the sidebar are to be made in compliance with the instance rules.

Community stats

  • 6.7K

    Monthly active users

  • 937

    Posts

  • 60K

    Comments