IoT Devices in a Password Spraying Botnet
Microsoft is warning Azure cloud users that a Chinese-controlled botnet is involved in “extremely evasive” password spraying. I’m not sure about the “very evasive” part; The techniques are basically what you get in a distributed password guessing attack:
“Any threat actor using the CovertNetwork-1658 infrastructure can conduct large-scale password spraying campaigns and greatly increase the likelihood of successful compromises and initial access to multiple organizations in a short period of time,” Microsoft officials wrote. “This scale, combined with the rapid operational benefit of vulnerable guarantees between CovertNetwork-1658 and Chinese threat actors, allows for the ability to account for vulnerabilities in multiple sectors and geographies.”
Some of the factors that make it difficult to find are:
- Use of compromised SOHO IP addresses
- Use of a rotating set of IP addresses at any given time. Threat actors had thousands of available IP addresses at your disposal. The average lifetime of a CovertNetwork-1658 node is about 90 days.
- Low volume password cracking process; for example, monitoring multiple failed login attempts from a single IP address or account will not detect this function.
Posted November 6, 2024 at 7:02 AM • 0 Comments
Bruce Schneier sidebar photo by Joe MacInnis.
Source link