A 22-Day Silent Breach
THE SITUATION
A prominent US-based organization contacted Benchmarked after discovering that their Microsoft 365 environment had been compromised. What initially appeared to be a simple phishing incident turned out to be a sophisticated, multi-phase attack that had been active for over three weeks - entirely undetected.
The reality was far worse than anyone assumed:
- A Global Administrator account had been compromised via a coordinated password spray campaign using 20+ globally distributed VPN exit nodes across 12 countries
- The attacker had established persistent backdoor access through a malicious OAuth application with full Exchange Web Services permissions - meaning password resets alone would not remove them
- Nearly 2,000 phishing emails had been sent from the compromised account in under 60 seconds, exploiting the trusted sender reputation of a legitimate administrator
- The attacker conducted 130+ authentication events across administrative portals in a single 2.5-hour window, systematically mapping the environment
- Both accounts in the environment held Global Administrator privileges - no separation of duties, no least-privilege controls, no conditional access policies
- No MFA was enforced. No audit logging was enabled. No email security controls were in place.
The breach had been active for 22 days before it was identified.