Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

Between March 18 and April 7, 2025, cybersecurity researchers identified a sophisticated campaign targeting Microsoft Entra ID by exploiting legacy authentication protocols. This campaign allowed attackers to circumvent critical security measures, including Multi-Factor Authentication (MFA) and Conditional Access policies, posing significant risks to enterprise environments.

Exploitation of Legacy Authentication Protocols

Legacy authentication protocols such as BAV2ROPC, SMTP AUTH, POP3, and IMAP4 lack modern security features, making them attractive targets for cybercriminals. Despite Microsoft’s efforts to deprecate or disable these outdated methods, many organizations continue to use them to support legacy systems or maintain business continuity. This reliance creates security vulnerabilities that attackers can exploit.

Details of the Attack Campaign

Researchers from Guardz observed a coordinated attack campaign involving automated credential spraying and brute-force techniques aimed at these legacy endpoints. Over a three-week period, more than 9,000 suspicious Exchange login attempts were recorded, with the majority originating from Eastern Europe and the Asia-Pacific regions. The campaign escalated in intensity, peaking between April 4 and 7, when 8,534 attempts were documented in a single day.

Approximately 90% of these attacks targeted Exchange Online, indicating a strategic focus on accessing email communications and potentially harvesting sensitive information and authentication tokens.

Understanding BAV2ROPC: A Technical Backdoor

Central to this campaign was the exploitation of BAV2ROPC (Basic Authentication Version 2, Resource Owner Password Credential), a legacy protocol designed to facilitate the transition to OAuth 2.0. BAV2ROPC allows applications to convert traditional username and password logins into token-based access through a non-interactive process.

In practice, an application using BAV2ROPC sends credentials directly to Entra ID, which then issues tokens without user interaction. This process bypasses standard authentication flows that would typically trigger MFA challenges or Conditional Access evaluations. The silent nature of this protocol makes it particularly dangerous, as it enables lateral movement within networks once initial credentials have been compromised.

Implications for Organizations

The exploitation of legacy protocols like BAV2ROPC underscores the critical need for organizations to assess and update their authentication methods. Relying on outdated protocols can expose enterprises to sophisticated attacks that bypass modern security controls.

Recommendations for Mitigation

To mitigate the risks associated with legacy authentication protocols, organizations should consider the following steps:

1. Disable Legacy Authentication Protocols: Identify and disable legacy protocols such as BAV2ROPC, SMTP AUTH, POP3, and IMAP4. Microsoft provides guidance on blocking legacy authentication to enhance security.

2. Implement Modern Authentication Methods: Transition to modern authentication protocols that support MFA and Conditional Access policies. This shift ensures that authentication processes are robust and resistant to exploitation.

3. Enforce Multi-Factor Authentication (MFA): Require MFA for all users, especially those with administrative privileges. MFA adds an additional layer of security, making it more difficult for attackers to gain unauthorized access.

4. Regularly Review and Update Security Policies: Continuously assess and update security policies to address emerging threats. Ensure that all authentication methods align with current best practices and industry standards.

5. Monitor and Audit Authentication Logs: Regularly monitor authentication logs for unusual activity, such as multiple failed login attempts or access from unfamiliar locations. Implementing robust logging and alerting mechanisms can help detect and respond to potential attacks promptly.

Conclusion

The recent campaign exploiting legacy authentication protocols in Microsoft Entra ID highlights the importance of modernizing authentication methods and adhering to best security practices. By proactively addressing vulnerabilities associated with outdated protocols, organizations can strengthen their defenses against sophisticated cyber threats and protect their digital assets.