Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

A China-linked botnet powered by 130,000 hacked devices has targeted Microsoft 365 accounts with password spraying attacks.

Botnet

A botnet controlled by a threat actor linked to China has been observed targeting Microsoft 365 accounts with large-scale password spraying attacks, SecurityScorecard reported on Monday.

According to the security firm, the botnet is powered by more than 130,000 compromised devices and the attacks aimed at Microsoft 365 accounts rely on non-interactive sign-ins with Basic Authentication.

“Non-interactive sign-ins, commonly used for service-to-service authentication, legacy protocols (e.g., POP, IMAP, SMTP), and automated processes, do not trigger MFA in many configurations. Basic Authentication, still enabled in some environments, allows credentials to be transmitted in plain form, making it a prime target for attackers.,” SecurityScorecard said.

While Microsoft is in the process of deprecating Basic Authentication, the security firm warns that these attacks pose an immediate threat.

The attack is stealthy because the password spraying attempts are recorded in non-interactive sign-in logs, which are often not monitored by security teams.  

SecurityScorecard has identified several command and control servers located in the United States. Monitoring the connections to these servers for four hours showed 130,000 devices communicating with them.

Advertisement. Scroll to continue reading.

The botnet powered by these devices takes credentials obtained by information-stealer malware and tests them against Microsoft 365 accounts. 

Once they gain access to the accounts, the hackers can obtain sensitive information, cause disruption to business operations, and move laterally within the targeted organization. 

The security firm believes the botnet is likely controlled by a Chinese threat group, but noted that its attribution efforts are ongoing. 

Microsoft reported in October 2024 that it had seen multiple Chinese threat actors using credentials sourced from a password spray operation that involved a network of compromised devices tracked as CovertNetwork-1658, Xlogin and Quad7.

Related: Citrix Warns of Password Spraying Attacks Targeting NetScaler Appliances

Related: Infostealer Infections Lead to Telefonica Ticketing System Breach

Related: Cisco Patches Vulnerability Exploited in Large-Scale Brute-Force Campaign

Related: Iranian Hackers Use Brute Force in Critical Infrastructure Attacks

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

MongoDB has appointed Doug Bowers as Chief Information Security Officer.

Ben Wilkens has been promoted to Director of Cybersecurity at NMFTA.

Cato Networks has appointed Meital Koren as Chief Legal Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.