CALL 0121 289 4477
A massive botnet, linked to a Chinese threat actor, has been caught launching large-scale password spraying attacks on Microsoft 365 accounts. SecurityScorecard, a cybersecurity firm, broke the news on Monday, revealing that over 130,000 compromised devices are being used to power these attacks.
The attackers rely on non-interactive sign-ins with Basic Authentication—a sneaky method that lets them bypass Multi-Factor Authentication (MFA) in many setups. These sign-ins are typically used for older protocols like POP, IMAP, and SMTP, as well as service-to-service authentication. Unfortunately, Basic Authentication still lingers in some environments, making it an easy target for hackers.
Microsoft is phasing out Basic Authentication, but in the meantime, this botnet is taking full advantage of it. And because these password spraying attempts show up in logs that security teams don’t usually monitor, they’re flying under the radar.
SecurityScorecard tracked the botnet’s activity and found several command and control (C2) servers based in the U.S.. Over a four-hour period, they observed 130,000 devices communicating with these servers.
Here’s what the attackers are doing:
While SecurityScorecard believes this botnet is controlled by a Chinese threat group, their investigation is still ongoing. Microsoft, in an October 2024 report, also flagged multiple Chinese threat actors using password spray attacks from a similar botnet, tracked under names like CovertNetwork-1658, Xlogin, and Quad7.
We hope you’ve liked this blog and that you’ll stick around to see our future releases. We cover everything from recent IT News to Knowledgebase articles. Thanks for reading!