{"id":15803,"date":"2025-12-29T14:13:52","date_gmt":"2025-12-29T01:13:52","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=15803"},"modified":"2025-12-29T14:13:52","modified_gmt":"2025-12-29T01:13:52","slug":"urgent-advisory-were-seeing-a-significant-increase-in-authentication-attacks-this-christmas","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=15803","title":{"rendered":"URGENT ADVISORY:  We&#8217;re seeing a significant increase in authentication attacks this Christmas"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;104.2px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<h2>Significant Hacking Trend\u00a0<\/h2>\n<p>Over this 2025\/26 Christmas and New Year period, our Kinetics KARE security monitoring has detected a significant increase in sophisticated authentication attacks targeting New Zealand businesses.<\/p>\n<p>KARE Foundation clients are protected and experiencing minimal impact. However organisations with ad-hoc or legacy cybersecurity are likely\u00a0 to be experiencing account lockouts and may be compromised.<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h2>What We&#8217;re Observing<\/h2>\n<p>Attackers are attempting to authenticate using SMTP mail protocol, masquerading as &#8216;Microsoft Online&#8217; services. The activity appears to originate from Seoul, South Korea, routed through multiple international nodes. The timing is deliberate, targeting the holiday period when businesses operate with reduced IT oversight.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(34,34,34,0.07)&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;2px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h3>Observed Attack Vector (for the technically minded)<\/h3>\n<p><span data-teams=\"true\"><strong>Password spray \/ credential stuffing against legacy SMTP using ROPC<\/strong><br \/>An actor is programmatically attempting to authenticate to Exchange Online via <strong>SMTP AUTH<\/strong> using <strong>ROPC<\/strong> (username + password), which <strong>bypasses modern interactive prompts and MFA<\/strong>. Conditional Access (CA) policy that blocks legacy auth\/ROPC stopped token issuance, producing error <strong>53003<\/strong>. The <code>BAV2ROPC<\/code> agent and \u201cAuthenticated SMTP\u201d designation strongly indicate <strong>non\u2011interactive, legacy protocol abuse<\/strong> rather than a legitimate modern login.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h2>Who&#8217;s Protected, Who&#8217;s Vulnerable<\/h2>\n<h3>KARE Foundation Clients: Protected<\/h3>\n<p>Your multi-layered security is working as designed. Conditional access policies are blocking suspicious attempts.\u00a0 Multi-factor authentication will prevent unauthorised access, and our team is monitoring patterns 24\/7. You may notice slightly increased security alerts.\u00a0 This is your protection working correctly.<\/p>\n<h3>Ad-Hoc or Legacy Security: Vulnerable<\/h3>\n<p>Without systematic security, you&#8217;re likely to experience increased account lockouts, with the resulting productivity disruption from password resets, o worse if there are potential account compromises. Compromised email accounts provide attackers access to business communications, financial information, and customer data.<\/p>\n<h2>Immediate Actions\u00a0<\/h2>\n<h3>If You&#8217;re on KARE Foundation:<\/h3>\n<p>Continue normal operations. Report any unusual authentication challenges to our helpdesk. Stay vigilant for phishing attempts that may accompany these attacks.<\/p>\n<h3>If You Have Ad-Hoc Security:<\/h3>\n<ul>\n<li><strong>Enable multi-factor authentication<\/strong> on all business email accounts immediately<\/li>\n<li><strong>Review account lockout logs<\/strong> to identify targeted accounts<\/li>\n<li><strong>Alert staff<\/strong> about increased authentication attempts<\/li>\n<li><strong>Assess your security posture <\/strong>as this campaign reveals gaps that leave you vulnerable<\/li>\n<\/ul>\n<h2>Getting Protected<\/h2>\n<p>KARE Foundation can be implemented within a few business days, providing systematic security that blocks these attacks. Our complimentary Security Assessment identifies specific vulnerabilities and recommends proportionate improvements.<\/p>\n<h2>Contact Us Immediately<\/h2>\n<p>If you&#8217;re experiencing account lockouts or suspicious authentication attempts:<\/p>\n<p><strong>Phone: <\/strong>0800 546 384<\/p>\n<p><strong>Email: <\/strong>support@kinetics.co.nz<\/p>\n<p>&nbsp;<\/p>\n<p>This attack campaign will eventually subside, but the threat environment continues to intensify. The question isn&#8217;t whether you&#8217;ll invest in protection\u2014it&#8217;s whether you&#8217;ll do so proactively or pay far more in incident response costs and business disruption.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>Significant Hacking Trend\u00a0 Over this 2025\/26 Christmas and New Year period, our Kinetics KARE security monitoring has detected a significant increase in sophisticated authentication attacks targeting New Zealand businesses. KARE Foundation clients are protected and experiencing minimal impact. However organisations with ad-hoc or legacy cybersecurity are likely\u00a0 to be experiencing account lockouts and may be [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":15810,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-15803","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/15803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15803"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/15803\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}