Hackers use brute-force attacks since it is an uncomplicated technique to break passwords or get into systems without permission.
By systematically trying various combinations of usernames and passwords, attackers can exploit weak credentials.
Brute-force attacks are automated and scalable, enabling hackers to compromise multiple accounts or systems in a relatively short time.
Cybersecurity researchers at Cisco recently warned of massive brute-force attacks targeting VPNs and SSH services.
Cisco Talos appreciates the contributions of Brandon White, Phillip Schafer, Mike Moran, and Becca Lynch for identifying a worldwide increase in brute force attacks on VPNs, web authentication portals, and SSH services since at least March 18th, 2024.
Free Live Webinar
for DIFR/SOC Teams
: Securing the Top 3 SME Cyber Attack Vectors - Register Here
All these attacks originate behind TOR exit nodes and other anonymizing proxies and tunnels.
However, due to this reason, Cisco Talos is currently observing this widespread campaign.
These brute force attacks, which depend on the targeted environment, may result in unauthorized network access, account lockouts, and denial-of-service conditions.
Traffic volumes associated with this campaign have steadily increased since March, and this trend will probably continue.
This campaign affects other services as well; however, certain services have been identified as being affected.
Here below, we have mentioned all the services that are affected:-
Besides this, brute-force attempts leveraged both generic and organization-specific valid usernames.
The targeting appears indiscriminate and does not focus on any particular region or industry.
The traffic sources are commonly proxy services, including but not limited to those listed below:-
The given proxy services are employed as non-exclusive sources of traffic, whereas the attackers may use other ones.
Talos has blacklisted known associated IP addresses due to an enormous traffic surge, although source IPs will probably be changed.
Mitigation steps vary depending on the affected VPN solution, as these brute-force attacks aim at different types of VPN, web authentication portals, and SSH services.
Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP
.
Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…
The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…
Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…
Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…
Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…