Cardano Foundation X account hacked, scam links posted, then removed
Digital Forensics: The Cardano Foundation joins a long list of entities falling victim to X account hacks, including the Securities and Exchange Commission…Read More
todayDecember 8, 2024
Computer Forensic Sewa
Digital Forensics: The Cardano Foundation joins a long list of entities falling victim to X account hacks, including the Securities and Exchange Commission…Read More
Computer Forensic Sewa todayNovember 4, 2024
Digital Forensics:
Hackers working on behalf of the Chinese government are using a botnet of thousands of routers, cameras, and other Internet-connected devices to perform highly evasive password spray attacks against users of Microsoft’s Azure cloud service, the company warned Thursday.
The malicious network, made up almost entirely of TP-Link routers, was first documented in October 2023 by a researcher who named it Botnet-7777. The geographically dispersed collection of more than 16,000 compromised devices at its peak got its name because it exposes its malicious malware on port 7777.
In July and again in August of this year, security researchers from Serbia and Team Cymru reported the botnet was still operational. All three reports said that Botnet-7777 was being used to skillfully perform password spraying, a form of attack that sends large numbers of login attempts from many different IP addresses. Because each individual device limits the login attempts, the carefully coordinated account-takeover campaign is hard to detect by the targeted service.
On Thursday, Microsoft reported that CovertNetwork-1658—the name Microsoft uses to track the botnet—is being used by multiple Chinese threat actors in an attempt to compromise targeted Azure accounts. The company said the attacks are “highly evasive” because the botnet—now estimated at about 8,000 strong on average—takes pains to conceal the malicious activity.
“Any threat actor using the CovertNetwork-1658 infrastructure could conduct password spraying campaigns at a larger scale and greatly increase the likelihood of successful credential compromise and initial access to multiple organizations in a short amount of time,” Microsoft officials wrote. “This scale, combined with quick operational turnover of compromised credentials between CovertNetwork-1658 and Chinese threat actors, allows for the potential of account compromises across multiple sectors and geographic regions.
Some of the characteristics that make detection difficult are:
Written by: Sewa
Computer Forensic joe h
Digital Forensics: UAE’s M2 crypto exchange hacked for $13.7M, assures full fund recovery Oluwapelumi Adejumo · 9 hours ago · 2 min read Despite $13 million theft, M2 reassures customers ...
todayDecember 8, 2024
Computer Forensic Sewa
Digital Forensics: The Cardano Foundation joins a long list of entities falling victim to X account hacks, including the Securities and Exchange Commission…Read More
Copyright 2024 www.Krigo.io
Post comments (0)