Hacked TP-Link routers used in years-long account takeover attacks
Hackers linked to the Chinese government are using a botnet of TP-Link routers for password-spraying attacks on Microsoft Azure accounts, employing evasive techniques and targeting various organizations.
Read original articleHackers linked to the Chinese government are utilizing a botnet composed mainly of TP-Link routers to conduct sophisticated password-spraying attacks targeting Microsoft Azure accounts. This botnet, identified as Botnet-7777, was first reported in October 2023 and has been confirmed to consist of over 16,000 compromised devices at its peak. Microsoft, which tracks this botnet as CovertNetwork-1658, noted that the attackers employ a method that makes detection difficult by using a rotating set of IP addresses and low-volume login attempts. The botnet's activity has decreased recently, but this is attributed to the acquisition of new infrastructure rather than a reduction in operations. One of the groups using this botnet, known as Storm-0940, has targeted various organizations, including think tanks and government entities, and has been successful in gaining access to networks using credentials obtained through these password-spraying campaigns. The compromised devices are often infected through unknown means, and while rebooting may temporarily remove the malware, reinfection is likely. Microsoft has not provided specific guidance for users of affected devices on how to prevent or detect infections.
- A botnet of TP-Link routers is being used for password-spraying attacks on Microsoft Azure accounts.
- The botnet, known as CovertNetwork-1658, consists of around 8,000 active devices.
- Attackers employ evasive techniques, making detection of their activities challenging.
- The group Storm-0940 is one of the threat actors utilizing this botnet to target various organizations.
- Rebooting infected devices may temporarily remove malware, but reinfection is possible.
Related
Threat Actor Abuses Cloudflare Tunnels to Deliver Rats
Proofpoint reported increased cybercriminal activity using Cloudflare Tunnels to deliver malware, particularly remote access trojans. Campaigns involve phishing emails and exploit temporary tunnels, necessitating adaptive cybersecurity defenses.
China-linked cyber-spies infect Russian govt, IT sector
Chinese cyber-spies compromised Russian government and IT systems using malware, including GrewApacha and CloudSorcerer, through phishing emails and cloud services, indicating collaboration among state-sponsored hacking groups.
China-state IoT botnet went undetected for four years–until now
The FBI dismantled the Raptor Train botnet, linked to Chinese hackers, involving over 260,000 devices. It targeted government agencies and critical infrastructure, evading detection through reputable IP addresses.
China-state IoT botnet went undetected for four years–until now
The FBI dismantled the Raptor Train botnet, linked to Chinese hackers, involving over 260,000 devices. It targeted government and corporate entities, exploiting reputable IP addresses to evade detection.
Russian spies use remote desktop protocol files in unusual mass phishing drive
Microsoft reported a mass phishing campaign by the Russian SVR's Midnight Blizzard group, targeting various organizations with RDP file attachments in emails, potentially exposing sensitive data and enabling malware installation.
Related
Threat Actor Abuses Cloudflare Tunnels to Deliver Rats
Proofpoint reported increased cybercriminal activity using Cloudflare Tunnels to deliver malware, particularly remote access trojans. Campaigns involve phishing emails and exploit temporary tunnels, necessitating adaptive cybersecurity defenses.
China-linked cyber-spies infect Russian govt, IT sector
Chinese cyber-spies compromised Russian government and IT systems using malware, including GrewApacha and CloudSorcerer, through phishing emails and cloud services, indicating collaboration among state-sponsored hacking groups.
China-state IoT botnet went undetected for four years–until now
The FBI dismantled the Raptor Train botnet, linked to Chinese hackers, involving over 260,000 devices. It targeted government agencies and critical infrastructure, evading detection through reputable IP addresses.
China-state IoT botnet went undetected for four years–until now
The FBI dismantled the Raptor Train botnet, linked to Chinese hackers, involving over 260,000 devices. It targeted government and corporate entities, exploiting reputable IP addresses to evade detection.
Russian spies use remote desktop protocol files in unusual mass phishing drive
Microsoft reported a mass phishing campaign by the Russian SVR's Midnight Blizzard group, targeting various organizations with RDP file attachments in emails, potentially exposing sensitive data and enabling malware installation.