
Identity compromise is no longer a supporting tactic in Microsoft 365 intrusions — it is the primary entry point.
By early 2026, Microsoft reports processing approximately 38 million identity risk detections per day, reflecting a 32% surge observed in 2025 that continues into the current year (see the full Microsoft Digital Defense Report 2025 for detailed telemetry).
While ~97% of observed attacks remain password spraying or credential reuse attempts, more advanced Adversary-in-the-Middle (AiTM) phishing kits — particularly Tycoon2FA and successor frameworks — are accelerating session hijacking and token replay at scale. These intrusions frequently lead to Business Email Compromise (BEC), ransomware staging, data exfiltration, and lateral pivot into hybrid on-premises environments, often within hours.
The shift is structural: attackers no longer “break in” — they authenticate.
The Microsoft Digital Defense Report (2025) confirms that 97% of identity attacks remain password spraying. This reflects persistent structural weaknesses across tenants: inconsistent password hygiene, uneven Conditional Access enforcement, and incomplete deployment of phishing-resistant MFA.
Research and academia account for 39% of observed identity incidents, but no sector is insulated. The continued dominance of low-complexity credential attacks indicates that many organizations still leave basic authentication surfaces exposed.
Password spraying is noisy. AiTM phishing is precise.
Tycoon2FA and similar Phishing-as-a-Service (PhaaS) kits enabled millions of blocked malicious emails associated with AiTM phishing campaigns in late 2025, reflecting the scale and automation of modern phishing infrastructure. These kits proxy legitimate Microsoft login flows in real time, capturing session cookies and bypassing traditional MFA mechanisms.
The operational shift includes:
Phishing-resistant MFA (FIDO2/WebAuthn) has been shown to block the vast majority of automated account compromise attempts — often exceeding 99% effectiveness in Microsoft’s telemetry — yet enterprise-wide adoption remains inconsistent.
Sophos’ Active Adversary Report 2026 shows 67% of intrusions begin with identity compromise. Brute-force alone accounted for 15.6% of initial access. In 59% of cases, MFA was absent or improperly configured.
Compromised Microsoft 365 access is frequently monetized through:
Identity credentials are no longer just access keys — they are commodities.
The convergence of commodity phishing infrastructure and enterprise misconfiguration has compressed time-to-impact across cloud intrusions.
Across incident reporting and tenant telemetry, recurring campaign patterns include:
These are not isolated events. They represent structured, repeatable intrusion playbooks.
Nation-state actors — including Chinese, Russian, and Iranian groups — increasingly leverage the same identity-focused TTPs used by financially motivated cybercrime groups. The dividing line between espionage and criminal monetization now lies in intent, not technique.
A single compromised account can expose:
BEC incidents frequently result in financial losses ranging from tens of thousands to hundreds of thousands of dollars per event, with aggregate annual losses reaching into the billions globally. Ransomware deployment frequently follows within hours. Regulatory exposure (GDPR, CCPA, PIPEDA, and sector mandates) compounds financial impact.
For MSPs and multi-tenant environments, compromise cascades across clients, amplifying operational and reputational damage.
The strategic shift is clear: Endpoint telemetry rarely provides early warning in identity-driven attacks. Identity telemetry does.
Repeated across incident data:
AI-driven lure generation and automation now enable attackers to scale personalization while lowering operational cost and increasing campaign velocity. The barrier to entry for identity-focused campaigns continues to decline.
Organizations should prioritize:
Require FIDO2/WebAuthn or certificate-based authentication for all users — especially administrators. Block legacy authentication protocols entirely.
Enable Entra ID Protection and risk-based Conditional Access policies. Restrict OAuth app consent. Audit and remove unused service principals.
Enforce strict SPF, DKIM, and DMARC alignment. Avoid third-party routing that disrupts DMARC enforcement.
Continuously review sign-in logs for anomalous geographies, new MFA registrations, inbox rule creation, and OAuth permission grants. Use Defender for Cloud Apps / XDR to detect AiTM indicators such as proxy user agents or empty Device IDs.
Implement Privileged Identity Management (PIM) for just-in-time elevation. Maintain segmented break-glass accounts with active monitoring.
If identity visibility or configuration maturity is lacking, external MDR or identity-focused monitoring should be considered proactively — not reactively.
Identity compromise is now the highest-probability initial access vector in Microsoft 365 environments.
Attackers exploit authentication pipelines rather than software vulnerabilities. Tokens replace malware. Session hijacking replaces payload execution.
Organizations that continue to anchor detection in endpoint artifacts while under-investing in identity telemetry are operating with structural blind spots.
In 2026, defending Microsoft 365 means defending the authentication layer — and treating identity telemetry as the primary detection surface.