Like the title says, I’ve got yesterday an email with a code to access my Microsoft account and that made me suspicious because I wasn’t trying to login to my account. When I looked at the login attempts I saw that someone else was trying to access my account, I changed my password, activated TFA. Thinking of going through and buying a physical key like yubico to further secure my account. Any tips are appreciated.

  • @[email protected]
    link
    fedilink
    1810 months ago

    Happened to me too yesterday. Gave me a big bump to my evening plans. Luckily I too have 2fa activated via 2 different systems {SMS AND second Mail address). They cracked my randomly generated password - which doesn’t surprise me that much, brute force cracker are pretty effective nowadays.

    What bums me is that I used this as an argument to teach a friend but he just used the same ol’ reliable “naah, I’m too lazy”. Can’t change him, just told him to think about using 2fa everywhere money is involved. The rest is up to him.

    What’s also pretty bad from MS is that yes you can use several different mailadresses but no you can’t prevent that all of them can be used as login. One is compromised but also used for mail traffic so I can’t just delete it. But also can’t prevent it from logging in to the account. Thanks MS…

    • kamiheku
      link
      fedilink
      4510 months ago

      They cracked my randomly generated password - which doesn’t surprise me that much, brute force cracker are pretty effective nowadays.

      I’m actually surprised that it’d be feasible to use a brute force approach to gain access to an online account. I would expect them to hit some kind of rate-limiting long before they’d find the correct password

      • edric
        link
        fedilink
        15
        edit-2
        10 months ago

        Brute force attacks are usually done offline, where the attacker somehow gets a copy of a database of hashed passwords and they can take as many attempts as they want locally before they get a hit and can try it online.

      • @[email protected]
        link
        fedilink
        English
        310 months ago

        Looking at my history, they’re hours or a day apart. Probably no chance of getting into any halfway decent password that way, but if they can automate it with thousands of different email addresses, eventually they’d get an account with a weak password and get in.

    • @[email protected]
      link
      fedilink
      English
      1010 months ago

      I appreciate when commenters end their first paragraph with bullshit so you don’t have to read any farther. I’d love to hear how you think they cracked your randomly generated password via brute force against Microsoft.

    • @[email protected]
      link
      fedilink
      8
      edit-2
      10 months ago

      Hey so you actually can make it so an email address doesn’t log into the account, it’s how I stopped one particularly persistent hacking attempt when they finally managed to crack my password but were stopped by 2fa. Go to your profile > account info > sign in preferences, then as long as you have an alias email on the account you can deselect ones that you don’t want to be able to be used as a log-in.

      • @[email protected]
        link
        fedilink
        310 months ago

        With Microsoft I couldnt figure out how to enable 2fa against minecraft. Seems they do not have 2fa of any kind there and that is linked to your microsoft account. I guess the permissions there are just for minecraft, but if I was a betting man, I would venture there is a big hole there.

    • @[email protected]
      link
      fedilink
      English
      410 months ago

      What kind of randomly generated password did you have that was crackable? I usually use 30 characters completely random string. If that’s crackable, maybe I need to rethink things.