@gbhackers.com - 25d
A massive brute force password attack is currently targeting a wide range of networking devices, including VPNs and firewalls from Palo Alto Networks, Ivanti, and SonicWall. The attack, which began recently, utilizes almost 2.8 million IP addresses in an attempt to guess the credentials for these devices. Once access is gained, threat actors can hijack devices or gain access to entire networks.
A brute force attack involves repeatedly attempting to log into an account or device using numerous username and password combinations until the correct one is discovered. This type of attack highlights the importance of strong, unique passwords and multi-factor authentication to protect sensitive systems and data from unauthorized access. The attack was first reported by BleepingComputer on February 8, 2025. Recommended read:
References :
@cyberalerts.io - 2d
References:
Virus Bulletin
, securityaffairs.com
,
A mass exploitation campaign has targeted internet service providers (ISPs) in China and the U.S. West Coast, resulting in the deployment of information stealers and cryptocurrency miners. The Splunk Threat Research Team identified over 4,000 ISP IPs targeted in these brute-force attacks, exploiting weak credentials to gain initial access. Attackers are leveraging this access to deploy payloads designed for data exfiltration and establishing persistence within compromised systems.
The attacks involve minimal intrusive operations to avoid detection, primarily using scripting languages like Python and PowerShell for command-and-control (C2) operations via Telegram. Upon gaining access, attackers deploy executables via PowerShell for network scanning, information theft, and XMRig cryptocurrency mining. The deployed stealer malware captures screenshots and steals clipboard content, searching for cryptocurrency wallet addresses, with gathered information exfiltrated to a Telegram bot. The attackers specifically targeted CIDRs of ISP infrastructure providers using a masscan tool to identify open ports and conduct credential brute-force attacks. Recommended read:
References :
SC Staff@scmagazine.com - 48d
Hackers are exploiting the FastHTTP library, written in Go, to conduct rapid brute-force password attacks against Microsoft 365 accounts worldwide. These attacks are characterized by generating a high volume of HTTP requests aimed at Azure Active Directory endpoints. The technique leverages the high-performance nature of FastHTTP to accelerate credential-based attacks. SpearTip, an incident response firm, reported that this malicious activity began on January 6th, 2025. Analysis reveals a significant portion of the attack traffic originates from Brazil, with other countries like Turkey, Argentina, Uzbekistan, and Pakistan also involved.
These attacks primarily target the Azure Active Directory Graph API, utilizing the 'fasthttp' user agent. While most attempts failed due to authentication failures, locked accounts, and policy violations, a concerning 9.7% of attacks resulted in successful account takeovers. The attacks involved brute-force and multi-factor authentication fatigue attempts. Security experts recommend that administrators promptly assess potential compromises, manually verify user agents through the Azure portal, immediately expire user sessions, and reset account credentials upon detecting any suspicious activity. They also recommend a review of MFA devices linked to potentially compromised accounts. Recommended read:
References :
@github.com - 51d
References:
github.com
, help.nextcloud.com
Nextcloud users are reporting significant issues with the platform's brute-force protection mechanism, which is designed to safeguard against unauthorized access attempts. Users have been locked out of their servers due to what they believe are false positives. These lockouts occur when the system incorrectly identifies legitimate login attempts or other normal activity as brute-force attacks, causing frustration and disruption for users. The current settings lack the granularity needed to fine-tune the system to prevent these issues, forcing some to completely disable the protection feature, leaving their systems potentially vulnerable.
Some users have cited cases where devices on a home network, sharing an external IP address, are locked out even when using correct credentials. This highlights a need for the system to better understand normal traffic patterns and distinguish between genuine threats and ordinary usage, particularly in shared IP environments. There are calls to improve the configurability of the brute-force handling, to allow for more control over thresholds and behavior. This will help to minimize lockouts, offer more granular user control and ultimately ensure that the brute-force detection mechanism does not impede on legitimate users of the Nextcloud platform. Recommended read:
References :
|