A growing number of Microsoft account holders report successful sign‑ins from IP addresses inside Microsoft’s own network despite having two‑factor authentication enabled — an uptick of incidents first detailed in a German investigation and corroborated by threads on Reddit and Microsoft’s own Q&A boards. (learn.microsoft.com) This piece reviews the reported cases, explains the technical mechanics that make the reports plausible, verifies what Microsoft documents say about datacenter IPs and app‑driven sign‑ins, and lays out concrete, prioritized steps both consumers and admins should take today to reduce exposure.
Microsoft’s Recent activity (personal accounts) and My sign‑ins (work/school accounts) pages display a subset of authentication events — sign‑in times, IP addresses, device type, and a location estimate — and label items that Microsoft considers “unusual.” The service explicitly notes that it does not show every single internal or app‑driven access, and that mobile networks or routing through cloud infrastructure may cause location fields to show unexpected geographies. (support.microsoft.com)
At the same time, long‑standing cloud threats make it possible for attackers to maintain account access without repeatedly re‑authenticating. Two dominant techniques explain how 2FA can appear to be circumvented in practice:
Proofpoint and other vendors reported that these policy changes should blunt the effectiveness of many AiTM and OAuth abuse campaigns, but policy is only part of the story — admin configuration, user behavior, and endpoint hygiene still determine outcomes. (proofpoint.com)
Multiple independent technical explanations — cloud front‑end/proxy routing, app‑driven authentication, legacy non‑interactive sign‑ins, and OAuth AiTM cookie theft — explain how access can occur without a visible MFA prompt, and these mechanisms are documented by both Microsoft and impartial security researchers. (learn.microsoft.com)
Actionable reality:
Implement the prioritized safeguards above now; if you still see unexplained successful sign‑ins recorded from Microsoft datacenter addresses after following the steps, capture the sign‑in timestamps and IPs and escalate to Microsoft Support and your security team for a tenant‑level investigation. (support.microsoft.com)
Source: BornCity Unauthorized logins to Microsoft accounts despite 2FA – Part 2 | Born's Tech and Windows World
Background / Overview
Microsoft’s Recent activity (personal accounts) and My sign‑ins (work/school accounts) pages display a subset of authentication events — sign‑in times, IP addresses, device type, and a location estimate — and label items that Microsoft considers “unusual.” The service explicitly notes that it does not show every single internal or app‑driven access, and that mobile networks or routing through cloud infrastructure may cause location fields to show unexpected geographies. (support.microsoft.com)At the same time, long‑standing cloud threats make it possible for attackers to maintain account access without repeatedly re‑authenticating. Two dominant techniques explain how 2FA can appear to be circumvented in practice:
- Non‑interactive or legacy authentication used by service accounts and some client apps can avoid interactive MFA challenges entirely.
- OAuth / Adversary‑in‑the‑Middle (AiTM) attacks capture session tokens or cookies during a proxied authentication flow, permitting attackers to replay authenticated sessions later without needing to pass MFA again. (microsoft.com)
What the BornCity investigation and community reports show
Key reported symptoms
- Account owners with 2FA enabled discovered successful sign‑ins from IPv6/IPv4 addresses that resolve to Microsoft datacenters (observed AS name: MICROSOFT‑CORP‑MSN‑AS‑BLOCK).
- Some affected users did not receive sign‑in notifications or push‑prompts at the time of the successful access.
- In some cases accounts were later disabled by Microsoft (for spam or compromise), while in others the owner discovered activity only after manually reviewing the Recent activity page.
Representative threads and examples
- A Reddit thread and multiple Microsoft Q&A posts describe sign‑ins recorded from Microsoft network addresses in Canada, Ireland and U.S. locations like Des Moines, appearing as “successful sign‑in” entries though 2FA was active and no prompt was seen. (learn.microsoft.com)
- Several users reported this behavior while using or re‑authenticating mobile apps (Outlook, OneDrive) and when enabling the Outlook app as a sign‑in option — which can create app‑driven tokens or connection flows that are routed through Microsoft service infrastructure. (support.microsoft.com)
Why Microsoft datacenter IPs show up in your activity — technical explanation
Microsoft front‑ends, proxies and mobile app traffic
Microsoft runs global front‑end services and proxies that sit between client apps (Outlook mobile, OneDrive sync, various Microsoft services) and the back‑end tenant services. When a client app uses Microsoft’s cloud endpoints or when traffic is proxied for performance, the sign‑in event recorded by Azure AD or the Recent activity page can show the proxy’s IP rather than the user’s device IP. Microsoft support and community answers explicitly call this out as a frequent cause of datacenter IP entries. (learn.microsoft.com)- Mobile apps often use Microsoft Graph, background sync, or other routed services that perform authentication tokens and refresh flows on behalf of the device.
- Those flows can be logged as traffic originating from Microsoft infrastructure (hence Microsoft datacenter IPs) even though the end user device initiated the activity.
Non‑interactive sign‑ins and legacy auth
Non‑interactive sign‑ins (used by services, scripts, and some legacy clients) do not perform interactive MFA challenges. Historically, this allowed automated access patterns to avoid 2FA entirely; Microsoft and security analysts have repeatedly warned about this class of blind spots. Microsoft’s Secure by Default changes in 2025 began blocking many legacy protocols and tightening default app consent rules to address these issues. (mc.merill.net)How 2FA is being subverted in real incidents (verified mechanisms)
There are three well‑documented vectors by which attackers gain or maintain access despite 2FA:- OAuth/AiTM phishing that captures session cookies (cookie theft). Attackers proxy the real Microsoft login page and capture the resulting session token during a successful login. Once the session cookie or token is captured, the attacker replays it — no new 2FA challenge is required. This technique is described in detail by Proofpoint and Microsoft’s own security teams. (proofpoint.com)
- Abuse of third‑party OAuth apps and delegated consent. Malicious apps (or abused verified apps) request delegated permissions; if a user or compromised account consents, attackers can use those app permissions to read mail, maintain access, or create credentials that avoid user prompts. Research shows actors have used verified‑publisher apps and crafted reply URLs to increase the success rate of these flows. (proofpoint.com)
- Legacy and non‑interactive authentication. Background jobs, older email clients, or device sync operations that rely on Basic Authentication or non‑interactive flows can authenticate with credentials alone and may not be subject to MFA prompts. Microsoft’s 2025 policy changes specifically target these vectors by blocking legacy protocols and requiring admin consent for many third‑party app actions. (mc.merill.net)
Evidence these techniques are being used in the wild
- Proofpoint documented active campaigns in 2025 using AiTM kits and OAuth redirect flows that intercepted session cookies and bypassed 2FA on many accounts; their telemetry shows thousands of targeted accounts across hundreds of tenants. (proofpoint.com)
- Microsoft Security Blog has warned about the misuse of OAuth apps to persist in compromised accounts and to automate follow‑on phishing or BEC activity. (microsoft.com)
What we can not verify (and why to be cautious)
- Claims that Microsoft staff or automated internal processes routinely access user mailboxes without 2FA for “porn scans,” CoPilot indexing, or other unspecified maintenance tasks remain unverified public assertions. Microsoft’s documentation and community responses indicate most datacenter IP entries are due to routed app/service traffic, not human operator activity. Until Microsoft publishes an explicit, auditable policy or log showing operator access, claims of secret internal bypasses should be treated cautiously. (learn.microsoft.com)
- The observation that some users cannot see certain activities in their Recent activity history is consistent with Microsoft’s statement that not all internal or routine service events are exposed to the Recent activity UI. That explains visibility differences, but it does not prove malicious internal access. (support.microsoft.com)
Practical, prioritized mitigation — what users (and admins) should do now
These steps are ordered by impact and feasibility. Implementing the first few actions will significantly reduce the most common paths to compromise.For all users (personal Microsoft accounts)
- Immediately review Recent activity, expand any suspicious entries and select “This wasn’t me” where appropriate. Follow the guided remediation if offered. (support.microsoft.com)
- Rotate your password to a strong, unique passphrase and enable Microsoft Authenticator or a hardware security key (FIDO2 / passkey) as the primary second factor. Avoid SMS when possible. (support.microsoft.com)
- Revoke app permissions: visit the account’s privacy & app permissions page and remove any unfamiliar third‑party apps that have access. Attackers often persist via delegated app permissions. (proofpoint.com)
- Sign out of all sessions and reset security info (alternate email, phone) to remove lingering session tokens. (support.microsoft.com)
For work / school accounts and IT admins
- Enforce modern authentication and block legacy authentication (Basic Auth). Microsoft's mid‑July 2025 Secure by Default changes already began enforcing these defaults for many tenants; verify and harden your tenant settings. (mc.merill.net)
- Implement Admin consent workflow for third‑party apps: prevent end users from consenting to app scopes without admin review. This change was pushed as a default by Microsoft in mid‑2025 and should be checked in your tenant’s App Consent settings. (mc.merill.net)
- Audit sign‑in logs for non‑interactive and service principal activity; look for unusual client‑app strings (fasthttp/axios) and sign‑ins from datacenter IP ranges correlated to unusual behavior. Use Microsoft Entra / Azure AD sign‑in logs and conditional access policies to block suspicious app or non‑interactive traffic. (support.microsoft.com)
- Use Conditional Access to require MFA or device compliance for high‑risk operations and restrict access by location or named IP ranges where feasible.
- Revoke stale refresh tokens and require re‑authentication for accounts that show anomalous activity.
Quick checklist (users)
- Change password
- Remove unexpected app permissions
- Turn on Authenticator or FIDO2 keys
- Sign out of all devices (force token revocation)
- Contact Microsoft Support if account was blocked or used for spam
How to interpret a “Microsoft datacenter” sign‑in in your logs
When you see an IP that maps to Microsoft (for example, an IPv6 that resolves to MICROSOFT‑CORP‑MSN‑AS‑BLOCK), ask:- Did I use a Microsoft mobile app (Outlook, OneDrive) recently? If yes, this may be a routed app flow. (support.microsoft.com)
- Was the entry marked “Unusual activity” or “Sign‑in blocked”? If Microsoft blocked the account for spam, that indicates substantive misuse beyond a routed sync flow.
- Are there corresponding events in Azure AD sign‑in logs that show app consent, token issuance, or non‑interactive client types? Admins should map these to the tenant sign‑in logs to determine cause. (support.microsoft.com)
Why Microsoft’s mid‑2025 policy changes matter
Microsoft began updating default tenant settings in mid‑July 2025 to block legacy authentication protocols and require admin consent for many third‑party app accesses. These defaults make it harder for attackers to rely on Basic Auth, and they reduce the blast radius of app consent abuse by requiring administrator oversight. For tenants that flip to the new defaults, the attack surface for the common techniques discussed here will shrink significantly — provided admins actively monitor and remediate exceptions. (mc.merill.net)Proofpoint and other vendors reported that these policy changes should blunt the effectiveness of many AiTM and OAuth abuse campaigns, but policy is only part of the story — admin configuration, user behavior, and endpoint hygiene still determine outcomes. (proofpoint.com)
Conclusion — what this means for you and for trust in cloud identity
The BornCity reporting and the corroborating community threads raise valid, non‑trivial concerns: users are seeing Microsoft datacenter IPs in activity logs, accounts with 2FA have been accessed or abused, and some events are missing notifications or expected visibility.Multiple independent technical explanations — cloud front‑end/proxy routing, app‑driven authentication, legacy non‑interactive sign‑ins, and OAuth AiTM cookie theft — explain how access can occur without a visible MFA prompt, and these mechanisms are documented by both Microsoft and impartial security researchers. (learn.microsoft.com)
Actionable reality:
- For end users: treat any unexpected sign‑in flagged as “This wasn’t me” as high priority; rotate passwords, remove unexpected app consents, enable stronger MFA (Authenticator or FIDO2), and force token revocation. (support.microsoft.com)
- For admins: enforce modern auth, enable the Secure by Default controls, audit non‑interactive sign‑ins and app consent, and implement conditional access and token lifetimes to minimize persistent session abuse. (mc.merill.net)
Implement the prioritized safeguards above now; if you still see unexplained successful sign‑ins recorded from Microsoft datacenter addresses after following the steps, capture the sign‑in timestamps and IPs and escalate to Microsoft Support and your security team for a tenant‑level investigation. (support.microsoft.com)
Source: BornCity Unauthorized logins to Microsoft accounts despite 2FA – Part 2 | Born's Tech and Windows World