• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Iranian hackers breach defense orgs in password spray attacks

Sergiu Gatlan by Sergiu Gatlan
September 14, 2023
Reading Time: 3 mins read
0
Iranian hackers breach defense orgs in password spray attacks

Hacker

RELATED POSTS

Amazon sends Mastercard, Google Play gift card order emails by mistake

Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang

New Marvin attack revives 25-year-old decryption flaw in RSA

Image: Midjourney

Microsoft says an Iranian-backed threat group has targeted thousands of organizations in the U.S. and worldwide in password spray attacks since February 2023.

The state hackers also stole sensitive information from a limited number of victims in the defense, satellite, and pharmaceutical sectors.

Tracked as APT33 (aka Peach Sandstorm, HOLMIUM, or Refined Kitten), the cyber-espionage group has been active since at least 2013, attacking entities from various industry verticals (including government, defense, research, finance, and engineering) in the United States, Saudi Arabia, and South Korea.

“Between February and July 2023, Peach Sandstorm carried out a wave of password spray attacks attempting to authenticate to thousands of environments,” the Microsoft Threat Intelligence team said.

“Throughout 2023, Peach Sandstorm has consistently demonstrated interest in US and other country’s organizations in the satellite, defense, and to a lesser extent, pharmaceutical sectors,” Microsoft’s Sherrod DeGrippo Threat Intelligence Strategy Director told BleepingComputer.

Buy JNews
ADVERTISEMENT

In password spray attacks, threat actors try to log in to many accounts using a single password or a list of commonly employed passwords.

This tactic differs from brute force attacks, where a single account is targeted with a long list of passwords. Password spraying enables attackers to significantly increase their chances of success while reducing the risk of triggering automatic account lockouts.

In contrast to noisy password spraying, the attackers also used exploits targeting unpatched Confluence and ManageEngine appliances exposed online to breach the targets’ networks.

Following successful attempts, the APT33 hackers used the AzureHound or Roadtools open-source security frameworks for reconnaissance across the victims’ Azure Active Directory and to harvest data from their cloud environments.

They also used compromised Azure credentials, created new Azure subscriptions on the victims’ tenants, or abused Azure Arc for persistence purposes to control on-premises devices within the victims’ network.

The APT33 actors were also observed using Golden SAML attack techniques for lateral movement, deploying AnyDesk for persistence, sideloading custom malicious DLLs to execute malicious payloads, and employing a tunneling tool known as EagleRelay to tunnel malicious traffic to their command-and-control (C2) infrastructure.

APT33 tactics
APT33 tactics (Microsoft)

“Based upon the profile of victim organizations targeted and the observed follow-on intrusion activity, Microsoft assesses that this initial access campaign is likely used to facilitate intelligence collection in support of Iranian state interests,” Redmond said.

“Many of the cloud-based tactics, techniques, and procedures (TTPs) seen in these most recent campaigns are materially more sophisticated than capabilities used by Peach Sandstorm in the past,” the company added.

As Microsoft’s Identity Security Director, Alex Weinert, said three years ago, password spray attacks are among the most popular authentication attacks, amounting to more than a third of enterprise account compromises.

In July 2021, the NSA said the Russian APT28 military hacking group targeted the U.S. government and Department of Defense agencies in password spray attacks launched from Kubernetes clusters.

Months later, in October 2021, Microsoft also spotted the Iran-linked DEV-0343 and the Russian-sponsored Nobelium groups breaching defense tech companies and managed service providers (MSPs) in password spray attacks.

Share54Tweet34Pin12
Sergiu Gatlan

Sergiu Gatlan

Related Posts

Amazon sends Mastercard, Google Play gift card order emails by mistake
Cyber Security

Amazon sends Mastercard, Google Play gift card order emails by mistake

October 1, 2023
Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang
Cyber Security

Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang

October 1, 2023
New Marvin attack revives 25-year-old decryption flaw in RSA
Cyber Security

New Marvin attack revives 25-year-old decryption flaw in RSA

October 1, 2023
Hotel hackers redirect guests to fake Booking.com to steal cards
Cyber Security

Hotel hackers redirect guests to fake Booking.com to steal cards

September 23, 2023
BlackCat ransomware hits Azure Storage with Sphynx encryptor
Cyber Security

BlackCat ransomware hits Azure Storage with Sphynx encryptor

September 17, 2023
Caesars Entertainment confirms ransom payment, customer data theft
Cyber Security

Caesars Entertainment confirms ransom payment, customer data theft

September 14, 2023

Recommended Stories

What to expect as Ethereum’s perpetual futures plummet

What to expect as Ethereum’s perpetual futures plummet

September 24, 2023

Bitcoin spot ETF gets more bets as Franklin Templeton joins the race

September 12, 2023
Expert Warns of Possible Deflationary Depression as Money Supply Contracts: ‘Pay Attention to QT and the Money Supply’

Expert Warns of Possible Deflationary Depression as Money Supply Contracts: ‘Pay Attention to QT and the Money Supply’

March 10, 2023

Popular Stories

  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • A Brief History of All the Women Who Have Won the Nobel Prize

    136 shares
    Share 54 Tweet 34
  • Will XRP make a comeback after the recent price decline? Data suggests…

    136 shares
    Share 54 Tweet 34
  • Gowalla returns to see if location-based networking is ready for its mainstream moment

    136 shares
    Share 54 Tweet 34
  • Saudi Arabia Seeks U.S. Security Pledges, Nuclear Help for Peace with Israel

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Solana’s TVL surges: Will the momentum last?
  • Is Shiba Inu about to fall off the Top 20 list?
  • Ethereum Classic reclaims $16: Will traders go long?

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?