Microsoft is warning Azure cloud users that a Chinese controlled botnet is engaging in “highly evasive” password spraying. Not sure about the “highly evasive” part; the techniques seem basically what you get in a distributed password-guessing attack:

“Any threat actor using the CovertNetwork-1658 infrastructure could conduct password spraying campaigns at a larger scale and greatly increase the likelihood of successful credential compromise and initial access to multiple organizations in a short amount of time,” Microsoft officials wrote. “This scale, combined with quick operational turnover of compromised credentials between CovertNetwork-1658 and Chinese threat actors, allows for the potential of account compromises across multiple sectors and geographic regions.”

Some of the characteristics that make detection difficult are:

The use of compromised SOHO IP addresses
The use of a rotating set of IP addresses at any given time. The threat actors had thousands of available IP addresses at their disposal. The average uptime for a CovertNetwork-1658 node is approximately 90 days.
The low-volume password spray process; for example, monitoring for multiple failed sign-in attempts from one IP address or to one account will not detect this activity.

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore More

FAA to issue cyber rule for newly built airplanes and equipment

August 20, 2024 0 Comments 0 tags

The Federal Aviation Administration this week will formally propose cybersecurity mandates for future manufactured aircraft and equipment like engines and propellers, according to a post in the Federal Register. The

Meta to Fight Celeb-Bait Scams with Facial Recognition

October 22, 2024 0 Comments 0 tags

Meta is testing facial recognition technology to tackle celeb-bait ad scams and enable the recovery of compromised accounts

Juniper Releases Security Bulletin for Multiple Juniper Products

April 12, 2024 0 Comments 0 tags

Juniper has released security updates to address multiple vulnerabilities in Junos OS, Junos OS Evolved, Paragon Active Assurance and Junos OS: EX4300 Series. A cyber threat actor could exploit some of these