Credential theft

UK Parliament Email Brute-Force Attack (~90 Accounts Compromised)

πŸ“… 2017-06-23 🏒 Microsoft Outlook Web Access (OWA)
Primary Source β†—

Incident Details

On June 23–24, 2017, an unknown attacker conducted a sustained brute-force attack against the UK Parliament’s Outlook Web Access (OWA) email portal at Westminster. Parliament’s IT team detected the attack and took the remote email access system offline as a precaution within approximately 12 hours, impacting around 9,000 parliamentary email users. Approximately 90 accounts were confirmed compromised β€” those belonging to MPs and staff who had used weak passwords without multi-factor authentication on remote access. The UK National Cyber Security Centre (NCSC) investigated. Formal attribution was not publicly declared, though UK intelligence sources widely reported attribution to a foreign state actor, with Iran’s IRGC-affiliated Charming Kitten (APT35) as the primary suspect. The incident came just weeks after WannaCry had disrupted the NHS (May 2017), and prompted the UK Parliament to mandate multi-factor authentication for all remote email access. The relatively unsophisticated attack vector (brute-force against OWA without MFA) underscored how basic security hygiene failures in high-profile institutions create disproportionate vulnerabilities.

Technical Details

Initial Attack Vector
Sustained brute-force attack against UK Parliament's internet-facing Outlook Web Access (OWA) email portal; attackers targeted accounts where MPs and staff used weak passwords without multi-factor authentication enforced on remote access
Vendor / Product
Microsoft Outlook Web Access (OWA)

Timeline

  1. 2017-06-23 Breach occurred
  2. 2017-06-24 Publicly disclosed
  3. 2017-06-24 Customers notified