Like the title says, I’ve got yesterday an email with a code to access my Microsoft account and that made me suspicious because I wasn’t trying to login to my account. When I looked at the login attempts I saw that someone else was trying to access my account, I changed my password, activated TFA. Thinking of going through and buying a physical key like yubico to further secure my account. Any tips are appreciated.

  • Thrife@feddit.de
    link
    fedilink
    arrow-up
    15
    arrow-down
    1
    ·
    6 个月前

    Happened to me too yesterday. Gave me a big bump to my evening plans. Luckily I too have 2fa activated via 2 different systems {SMS AND second Mail address). They cracked my randomly generated password - which doesn’t surprise me that much, brute force cracker are pretty effective nowadays.

    What bums me is that I used this as an argument to teach a friend but he just used the same ol’ reliable “naah, I’m too lazy”. Can’t change him, just told him to think about using 2fa everywhere money is involved. The rest is up to him.

    What’s also pretty bad from MS is that yes you can use several different mailadresses but no you can’t prevent that all of them can be used as login. One is compromised but also used for mail traffic so I can’t just delete it. But also can’t prevent it from logging in to the account. Thanks MS…

    • kamiheku@sopuli.xyz
      link
      fedilink
      arrow-up
      26
      ·
      6 个月前

      They cracked my randomly generated password - which doesn’t surprise me that much, brute force cracker are pretty effective nowadays.

      I’m actually surprised that it’d be feasible to use a brute force approach to gain access to an online account. I would expect them to hit some kind of rate-limiting long before they’d find the correct password

      • edric@lemm.ee
        link
        fedilink
        arrow-up
        8
        ·
        edit-2
        6 个月前

        Brute force attacks are usually done offline, where the attacker somehow gets a copy of a database of hashed passwords and they can take as many attempts as they want locally before they get a hit and can try it online.

      • Itsamelemmy@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        6 个月前

        Looking at my history, they’re hours or a day apart. Probably no chance of getting into any halfway decent password that way, but if they can automate it with thousands of different email addresses, eventually they’d get an account with a weak password and get in.

    • Polkira@lemmy.ca
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      6 个月前

      Hey so you actually can make it so an email address doesn’t log into the account, it’s how I stopped one particularly persistent hacking attempt when they finally managed to crack my password but were stopped by 2fa. Go to your profile > account info > sign in preferences, then as long as you have an alias email on the account you can deselect ones that you don’t want to be able to be used as a log-in.

      • stanka@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        6 个月前

        With Microsoft I couldnt figure out how to enable 2fa against minecraft. Seems they do not have 2fa of any kind there and that is linked to your microsoft account. I guess the permissions there are just for minecraft, but if I was a betting man, I would venture there is a big hole there.

    • Radium@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 个月前

      I appreciate when commenters end their first paragraph with bullshit so you don’t have to read any farther. I’d love to hear how you think they cracked your randomly generated password via brute force against Microsoft.

  • Saff@lemmy.ml
    link
    fedilink
    arrow-up
    11
    ·
    6 个月前

    As long as you have 2Fa setup via a yubikey or phone app, and it via sms or email, you should be fine, they will give up eventually.

  • hinterlufer@lemmy.world
    link
    fedilink
    arrow-up
    5
    ·
    6 个月前

    PSA: you can add mail aliases for outlook and set one of the new aliases as your only valid login address. That way no one knows your login email address in the first place.

  • skozzii@lemmy.ca
    link
    fedilink
    arrow-up
    4
    ·
    6 个月前

    They cracked my password from a German VPN about a month ago. I Changed to passwordless within mins.

    They seem to be really targeting Microsoft users, I am suprised Microsoft hasn’t released a statement.

      • Sarie@lemmy.world
        link
        fedilink
        arrow-up
        10
        arrow-down
        1
        ·
        6 个月前

        Same here, I have been in the same situation for years. Looks like if you email appears in a data breach every hacker in the world tries to get access to your email. Just never reuse your email password and set 2FA. That’s more than enough to prevent unauthorized access and don’t lose sleep over it.

        • Transporter Room 3@startrek.website
          link
          fedilink
          arrow-up
          3
          ·
          6 个月前

          I got a notification from my original Xbox account from 2008 saying someone had managed to crack the password and needed the 2fa code.

          I went to check on sign in activity and holy shit I knew that email account had been leaked long ago but I was not prepared for dozens to hundreds of sign-in attempts EVERY SINGLE DAY, from all over the world (at least I assume places that are popular VPN outlets)

          That account doesn’t have a single thing on it. No games, no cards, it was never even connected to the internet except the rare occasion when I was at a friend’s house. And I don’t re-use passwords except on throwaway accounts. So they would have been quite disappointed by it.

          But just to be sure I changed the password again on all my big accounts or accounts with cards attached just in case.

  • MystikIncarnate@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    6 个月前

    What you need to realize is that for Microsoft, these attacks are constant. They deal with them basically 24/7/365. The target might change, but the attacks never stop.

    Between Hotmail, Outlook, and exchange online (365) they’re handling a large number of attacks per second all the time.

    If they started to inform you about it, they would easily triple the emails they’re handling due to all the failure messages.

    This is nothing new to them, it’s been going on since long before you noticed. Any MFA will effectively stop any attacker in their tracks. Make sure you have changed your password since you got that code sent to you, since that usually indicates a successful password breach.

    Yubikeys are a good idea but you should always have a backup, so if you can afford it, buy two. One to carry, one to use. The downside is that each needs to be enrolled separately to each service that they’re used for. It’s not an issue to have multiple keys associated to the account, so that would be my recommendation.

    I have a yubikey for work, and I use TOTP as a backup, and personally, I have a pair of Google Titan security keys. One to carry and one to stay at home.

  • chuck@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    6 个月前

    Lol. I noticed an attempt every five minutes the other day. Joys of an older account. Use MFA everyone, it’s getting hairy out there!