Who is attacking my environment? (Failed Attacks)
Investigate unsuccessful login attempts and attacker behavior
Investigating failed attacks
Overview
The Failed Attacks tab provides visibility into unsuccessful login attempts targeting your organization’s M365 environment. This allows you to:
- View geographic distribution of attack attempts
- Identify most frequently targeted accounts
- Recognize specific attack tactics and toolkits
- Track attack patterns over time
- Generate reports for client presentations
Failed attacks represent unsuccessful attempts to access your tenant. While these attacks were blocked, they provide valuable intelligence about attacker behavior and targeting patterns.
Accessing Failed Attacks
- Navigate to your tenant by selecting it from the tenant selector in the top left corner.
- Click on the Reporting tab in the top navigation bar.
- Select the Failed Attacks tab.
Dashboard Components
Geographic Distribution Map
The interactive map displays the global origins of failed attack attempts. Each point represents the location where an attack was observed.
The geographic location indicates where the attack traffic originated, which may represent proxies or VPNs rather than the attacker’s actual location. The United States is commonly shown as a source of attack traffic.
Attack Statistics
The dashboard shows key metrics including:
- Total number of failed attacks
- Top countries of origin
- Attack tactics observed
- Timeline showing attack frequency
- Most targeted accounts
Attack Types
Petra identifies the types of failed attacks. Here are a few of the most common:
Legacy Authentication
The most common attack vector involves legacy authentication protocols, which often lack modern security controls.
Attacker-in-the-Middle (AiTM) Toolkits
Petra specifically identifies known phishing-as-a-service toolkits:
Petra names AitM Phishing-as-a-Service toolkits with the moniker ‘Hornet’. When you see “Frantic Hornet” or “Piercing Hornet”, for example, these indicate more sophisticated phishing-as-a-service attacks. These tools are designed to bypass MFA and indicate there is a campaign underway.
Cloud Resource Targeting
Attacks labeled “Azure ACOM” or “Azure SSO Spoof” indicate attempts to access Azure resources, potentially to:
- Deploy cryptocurrency mining operations
- Spin up unauthorized cloud resources
- Access sensitive data
Detailed Attack List
Below the summary dashboard, you’ll find a detailed list of all failed attacks:
- Filter the list to focus on specific attack types
- Sort by date to identify recent campaign patterns
- Look for patterns in targeted accounts or attack methods
Pay special attention to non-legacy auth attacks, as these often indicate more sophisticated threat actors specifically targeting your organization.
Understanding Targeted Accounts
Common targets typically include:
- Shared mailboxes: accounts like sales@, info@, or accounting@
- Executive accounts: CEO, CFO and other C-suite positions
- Previously compromised users: attackers often repeatedly target users who have clicked phishing links in the past
Targeted accounts are great first steps for hardening an environment. They make fantastic launchpads for M365 hardening projects.
Generating Reports
Failed attack data can be compiled into client-ready PDF reports:
- Navigate to the Report Builder section
- Select the failed attacks module
- Generate a PDF containing:
- Summary of attack statistics
- Specifically listing: who’s being targeted, by which attack vectors
- Sample of notable failed attacks
- Uncommon attack activity details
For more detailed analysis of specific attack patterns, see our Research
Note that this report can be customized to fit your branding.