HomeCII/OTLarge Botnet Attacks Microsoft 365 Accounts

Large Botnet Attacks Microsoft 365 Accounts

Published on

spot_img

A botnet comprising over 130,000 compromised devices has been uncovered, launching coordinated password-spraying attacks aimed at Microsoft 365 (M365) accounts. Security experts at SecurityScorecard are investigating potential ties to China-affiliated threat actors, pointing to infrastructure associated with CDS Global Cloud and UCLOUD HK, both with connections to China. The attack is utilizing command-and-control (C2) servers provided by SharkTech, a U.S.-based hosting service previously known for facilitating malicious activities.

David Mound, Threat Intelligence Researcher at SecurityScorecard, emphasized the significance of these findings, highlighting how cyber adversaries continually exploit vulnerabilities in authentication processes. He emphasized the importance of not solely relying on Multi-Factor Authentication (MFA) as a defense mechanism, stressing the need for a comprehensive understanding of non-interactive logins to bolster security measures.

Although password spraying is a familiar tactic in cyberattacks, this particular campaign stands out due to its extensive reach, stealthy execution, and exploitation of a critical security blind spot. Unlike previous incidents attributed to threat groups like Volt Typhoon from China and APT33 from Iran, this botnet employs Non-Interactive Sign-Ins to evade detection by conventional security controls. By targeting Non-Interactive Sign-Ins, which are commonly used for service-to-service authentication, the attackers can operate without triggering MFA defenses or Conditional Access Policies (CAP), even within highly secured environments.

The industries most at risk from this attack include financial services, healthcare, government and defense, technology and SaaS providers, and education and research institutions that heavily rely on Microsoft 365 for their operations. These sectors face specific threats ranging from fraud and insider breaches to espionage and intellectual property theft.

The implications of this attack are far-reaching, with potential ties to nation-state actors, bypassing of robust security measures, and a worrying trend towards similar tactics being employed in past cyber campaigns. Security teams are urged to review non-interactive sign-in logs, rotate compromised credentials, disable legacy authentication protocols, monitor for stolen credentials linked to their organization, and implement conditional access policies to limit non-interactive login attempts.

As Microsoft plans to phase out Basic Authentication completely by September 2025, the urgency for organizations to transition to more secure authentication methods has never been more critical. Failure to address these vulnerabilities promptly could lead to further exploitation on a larger scale, emphasizing the pressing need for proactive cybersecurity measures.

Source link

Latest articles

Core Infrastructure Engineer Pleads Guilty to Federal Charges in Insider Attack

In a recent discussion on cybersecurity, a pivotal voice emphasized the importance of proactively...

One-Time Passcodes: A Gateway to Financial Fraud Attacks

Growing Threat of Account Takeover Fraud Through SMS Interception Recent insights from a report by...

Axios Explores the Future of Cybersecurity with Suspicions of Russian Use of iPhone Spyware

Future of Cybersecurity: Russian Suspected Use of iPhone Spyware In an era where digital connectivity...

Security Breach Exposes Dashboard of React2Shell Hackers to Researchers

In a troubling development within cybersecurity, attackers have become adept at leveraging vulnerabilities in...

More like this

Core Infrastructure Engineer Pleads Guilty to Federal Charges in Insider Attack

In a recent discussion on cybersecurity, a pivotal voice emphasized the importance of proactively...

One-Time Passcodes: A Gateway to Financial Fraud Attacks

Growing Threat of Account Takeover Fraud Through SMS Interception Recent insights from a report by...

Axios Explores the Future of Cybersecurity with Suspicions of Russian Use of iPhone Spyware

Future of Cybersecurity: Russian Suspected Use of iPhone Spyware In an era where digital connectivity...