top of page

Deconstructing the Tor Exit Node Attack on Microsoft

  • 2 days ago
  • 2 min read

Introduction

As the digital backbone for millions of enterprises, Microsoft Office 365 has become the primary option for modern identity-based warfare. Today’s attackers don't just "log in" they meticulously craft digital fingerprints to mirror legitimate employees, attempting to slip past automated defense unnoticed.


This analysis explores a high-severity incident where a corporate account was compromised through a combination of network anonymization and device metadata manipulation. By dissecting the forensics of a single authentication event, we can see how the attacker attempted to hide within a "trusted" session while inadvertently leaving behind a trail of anomalous technical markers.



Analysis

The incident was first detected by a CyberSift high-priority alert: "O365 Activity from Tor IP Address." While a successful login often signals a routine user session, the platform's correlation engine flagged this specific event due to its high-risk infrastructure and non-standard device signature.


Tor IP anonymization



A forensic look at the user's historical login baseline reveals a standard pattern of access from known corporate subnets. However, the audited event showed a sudden, unexplained shift:

  • The Infrastructure Shift: The user authenticated from an IP address (45.84.107.17) hosted by QuxLabs AB in Sweden.

  • The Proxy Layer: Threat intelligence indicates this IP is an active Tor Exit Node, a relay used by threat actors to bounce traffic across the globe, effectively bypassing "Impossible Travel" triggers by appearing from a neutralized geographic location.


Visualizing the deviation from the user's login baseline



Upon further inspection of the IP's reputation, intelligence confirms that this source is not just a proxy, but a known vector for Spam and Windows Exploits. The use of such infrastructure by a standard corporate user is a near-certain indicator of a proxy-based attack.


To conceal the true origin of the request and attempt to bypass Conditional Access, the actor utilized a multi-hop proxy strategy.

MITRE ATT&CK: T1090.003 (Proxy: Multi-hop Proxy)



The Cybersift Advantage

While traditional logs see a "successful login," Cybersift sees the hidden risk. By automatically correlating real-time threat intelligence with user behavioural baselines, our platform identifies the subtle fingerprints of a proxy-based attack, such as Tor exit nodes and manipulated device metadata, that static rules often miss.


The Bottom Line: Without this level of correlation, an attacker using a Tor node might have hours or days of quiet persistence. With Cybersift, the time from initial authentication to high-priority detection is reduced to seconds, enabling teams to revoke sessions before data exfiltration begins.



Conclusion

The persistence of phishing and session theft means that a "successful" login is no longer a guarantee of safety. Organizations must transition from simple identity verification to Continuous Access Evaluation (CAE).


This breach highlights that even when credentials are correct, the context-the network reputation, the device compliance, and the validity of the User-Agent-remains the final line of defense. Swift remediation, including revoking all active sessions and blacklisting anonymizer IPs, is critical to closing the gap before an automated compromise turns into a manual, interactive data breach.



IOCs

Type

IOC

IP Address

45.84.107[.]17

User-Agent

MSAL 1.1.0 (Macintosh; Mac OS X 26_3_0 arm64 en-US) PKeyAuth/1.0

ASN

Tor Exit Node / QuxLabs AB


-Written by Nootan Ranga Nayak

bottom of page