#passwordspraying

2025-06-12

TeamFiltration was built to safeguard systems, but now it's fueling attacks on over 80,000 accounts. How did a trusted tool flip sides and empower hackers? Discover the twist behind this dual-use dilemma.

thedefendopsdiaries.com/the-du

#teamfiltration
#cybersecurity
#cyberattacks
#penetrationtesting
#passwordspraying

Digitale Overheid (geautomatiseerd account)digitaleoverheid.nl@www.digitaleoverheid.nl
2025-06-04

Leer van Laundry Bear: tips voor digitale weerbaarheid

De AIVD en MIVD hebben op 27 mei 2025 een gezamenlijke waarschuwing uitgebracht over de Russische cybergroep Laundry Bear. Deze groep zat achter de hack op de Nederlandse politie in september 2024. Daarbij werden werkgerelateerde contactgegevens van alle agenten buitgemaakt. De publicatie gaat in op hoe de groep te werk gaat en hoe je je organisatie beschermt tegen dergelijke aanvallen.

Laundry Bear voert sinds 2024 gerichte cyberaanvallen uit op westerse overheden en organisaties. Hun focus ligt op de overheid, defensie, defensieleveranciers, maatschappelijke organisaties en digitale dienstverleners.

De groep gebruikt bekende aanvalsmethoden, zoals passwordspraying, het misbruiken van sessiecookies en Living-off-the-Land-technieken (gebruikmaken van bestaande software binnen een systeem).

Tips van AIVD en MIVD

De AIVD en MIVD adviseren organisaties in deze sectoren – en daarbuiten – om hun digitale weerbaarheid te versterken. Belangrijke aanbevelingen zijn:

  • Gebruik phishingbestendige multifactor-authenticatie (MFA);
  • Stel toegangsregels in op basis van IP-adressen en apparaten;
  • Beperk het gebruik van sessiecookies;
  • Beheer alle apparaten centraal. Vermijd Bring Your Own Device (BYOD);
  • Train medewerkers op digitale veiligheid;
  • Pas de 5 basisprincipes van het NCSC toe.

Lees meer over de publicatie. Bekijk ook de 5 basisprincipes op de website van het NCSC.

Dit is een automatisch geplaatst bericht. Vragen of opmerkingen kun je richten aan @DigitaleOverheid@social.overheid.nl

#bringYourOwnDevice #cyberaanvallen #cybergroep #cybersecurity #LivingOffLandTechnieken #nieuwsbrief102025 #passwordspraying #phishing #sessiecookies #weerbaarheid

vingers op toetsenbord met dwars op toetsenbord een hologram met slotje
2025-02-24

🚨 A botnet of 130,000 hacked devices is launching a massive Password-Spraying attack on Microsoft 365 and bypassing MFA 🔓⚠️

Read: hackread.com/botnet-devices-mi

#CyberSecurity #Microsoft365 #PasswordSpraying #Botnet

ITF Tech LtdITF_TECH
2024-11-16

Ever heard of 'password spraying'? No? It's where scammers try to gain access to all your accounts using a common password. Protect your business with strong, unique passwords and two-factor authentication

techtarget.com/whatis/definiti

2024-04-02

Researchers from HUMAN’s Satori Threat Intelligence discovered a significant number of VPN apps on Android phones that, without users' knowledge, turned their devices into criminal proxies as part of a campaign named PROXYLIB. Cybercriminals and state actors use proxies to hide their activities, making it harder for them to be caught. They found 28 apps on Google Play that did this, including 17 free VPNs, which have since been removed. The apps used a shared code library, PROXYLIB, to enroll devices into the criminal network. HUMAN also found hundreds of apps in third-party repositories that appeared to use the LumiApps toolkit, a Software Development Kit (SDK) which can be used to load PROXYLIB. They also tied PROXYLIB to another platform that specializes in selling access to proxy nodes, called Asocks.

Residential proxies are a network of proxy servers sourced from real IP addresses provided by internet service providers (ISPs), helping users hide their actual IP addresses by routing their internet traffic through an intermediary server. The anonymity benefits aside, they are ripe for abuse by threat actors to not only obfuscate their origins but also to conduct a wide range of attacks. Many threat actors purchase access to these networks to facilitate their operations. Some of these networks can be created by malware operators tricking unsuspecting users into installing bogus apps that essentially corral the devices into a botnet that's then monetized for profit by selling the access to other customers.

The Android VPN apps discovered by HUMAN are designed to establish contact with a remote server, enroll the infected device to the network, and process any request from the proxy network. This operation has been codenamed PROXYLIB by the company. The 29 apps in question have since been removed by Google. The anonymity benefits of residential proxies allow threat actors to not only hide their origins but also to conduct a wide range of attacks, including advertising fraud, password spraying, and credential stuffing attacks.

humansecurity.com/learn/blog/s

#cybersecurity #android #malware #vpn #proxylib #google #googleplay #apps #lumiapps #sdk #proxy #asocks #network #server #passwordspraying #humansecurity #satori #threatintelligence

Benjamin Carr, Ph.D. 👨🏻‍💻🧬BenjaminHCCarr@hachyderm.io
2024-02-28

#Russia's #CozyBear (#APT29) dives into cloud environments with a new bag of tricks
One of the ways Cozy Bear breaks into victims' cloud services is via #bruteforce and #passwordspraying attacks aimed at getting access to accounts used to manage apps and services, and to those belonging to users who no longer work at the victim org – in other words, which that aren't regularly monitored by a human. Additionally, #Kremlin's spies frequently use tokens to access accounts
theregister.com/2024/02/27/rus

securityskeptic :donor: :verified:securityskeptic@infosec.exchange
2024-01-22

Among the many articles reporting that Russian hackers accessed Microsoft Execs' Emails, I found this explanation of #passwordspraying - the alleged access method - usefully clear and concise:

"The company in its regulatory disclosure said attackers had executed a password spraying attack in late November and gained access to "a legacy non-production test tenant account." Password spraying is a technique in which hackers enter the same password guess into a number of accounts in an attempt to avoid account lockout by betting that at least one user uses a previously leaked password or has one that is easy to guess."

databreachtoday.com/microsoft-

@securityincidents "(...)Zugang zu einem #Testkonto erlangt. Über die weitreichenden #Berechtigungen dieses Kontos(...)"

Merke: Auch Testkonten sind kein Spielzeug.

Aber was ist eigentlich #PasswordSpraying? Ein fancy Term für Trial & Error?

2020-11-24

Post-Breach, Peatix Data Reportedly Found on Instagram, Telegram - Events application Peatix this week disclosed a data breach, after user account information report... threatpost.com/breach-peatix-d #credentialstuffing #passwordspraying #useraccountdata #phishingattack #websecurity #databreach #stolendata #instagram #telegram #breach #peatix #hacks

2020-09-11

APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins - The Russia-linked threat group is harvesting credentials for Microsoft's cloud offering, and targe... threatpost.com/apt28-theft-off #2020presidentialelection #credentialharvesting #passwordspraying #cloudsecurity #bruteforcing #websecurity #government #fancybear #microsoft #office365 #strontium #russia #sofacy #hacks #apt28

2020-01-12

Been hearing a lot about this in the security news, and now it seems as though it's been taken up a notch. #iran #passwordspraying #usa #security #cyberwarfare

Iranian hackers have been “password spraying” the US grid | Ars Technica
arstechnica.com/information-te

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst