Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

A China-linked botnet powered by 130,000 hacked devices has targeted Microsoft 365 accounts with password spraying attacks.

Botnet

A botnet controlled by a threat actor linked to China has been observed targeting Microsoft 365 accounts with large-scale password spraying attacks, SecurityScorecard reported on Monday.

According to the security firm, the botnet is powered by more than 130,000 compromised devices and the attacks aimed at Microsoft 365 accounts rely on non-interactive sign-ins with Basic Authentication.

“Non-interactive sign-ins, commonly used for service-to-service authentication, legacy protocols (e.g., POP, IMAP, SMTP), and automated processes, do not trigger MFA in many configurations. Basic Authentication, still enabled in some environments, allows credentials to be transmitted in plain form, making it a prime target for attackers.,” SecurityScorecard said.

While Microsoft is in the process of deprecating Basic Authentication, the security firm warns that these attacks pose an immediate threat.

The attack is stealthy because the password spraying attempts are recorded in non-interactive sign-in logs, which are often not monitored by security teams.  

SecurityScorecard has identified several command and control servers located in the United States. Monitoring the connections to these servers for four hours showed 130,000 devices communicating with them.

The botnet powered by these devices takes credentials obtained by information-stealer malware and tests them against Microsoft 365 accounts. 

Once they gain access to the accounts, the hackers can obtain sensitive information, cause disruption to business operations, and move laterally within the targeted organization. 

Advertisement. Scroll to continue reading.

The security firm believes the botnet is likely controlled by a Chinese threat group, but noted that its attribution efforts are ongoing. 

Microsoft reported in October 2024 that it had seen multiple Chinese threat actors using credentials sourced from a password spray operation that involved a network of compromised devices tracked as CovertNetwork-1658, Xlogin and Quad7.

Related: Citrix Warns of Password Spraying Attacks Targeting NetScaler Appliances

Related: Infostealer Infections Lead to Telefonica Ticketing System Breach

Related: Cisco Patches Vulnerability Exploited in Large-Scale Brute-Force Campaign

Related: Iranian Hackers Use Brute Force in Critical Infrastructure Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

Simon Forster has been named the new General Manager of DNS security firm Quad9.

Cybersecurity training company Immersive has named Mark Schmitz as its new CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.