Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » CyberCriminals Use Go Resty and Node, in 13 million Password attempts
Global Security

CyberCriminals Use Go Resty and Node, in 13 million Password attempts

AdminBy AdminFebruary 5, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


05 February 2025Red LakshmananCybersecurity / Security Cloud

Cybercriminals are increasingly using legal client tools HTTP to facilitate the absorption attack attacks (ATO) on the Microsoft 365 environment.

ENTERPRISE Security Company ProfofPoint said that there are companies used by HTTP Clients Axios and Node to send HTTP -interrogations and receive http -regions from the ATO attacks.

“Initially, derived from public repositories such as GitHub, these tools are increasingly used in attacks such as the Medium (AITM) and the methods of gross forces, leading to numerous incidents (ATO),” Anna Akslevich’s security researcher – Note.

Cybersecurity

Use of HTTP client tools for the attack attacks has become a long -observed trend since February 2018, and consistent iterations have been using Okhttp customer options to focus on the Microsoft 365 environment at least before the beginning of 2024.

But by March 2024, ProfofPoint said he began to observe a wide range of customers http, which were gaining cravings, and the attacks scale a new maximum, so 78% of Microsoft 365 tenants were directed at least once, attempts at the second half of the last half of the last half of the last half Year.

“In May 2024, these attacks reached the maximum, using millions of captured residential IPS to focus on cloud accounts,” Akslevich said.

The volume and variety of these attempts indicate the emergence of HTTP customers such as Axios, Go Resty, Node Fetch and Python, and those who combine accurate targeting with AITM methods reaching a higher compromise rate.

Axios, according to the point designed for Node.js and browsers and can be combined with AITM platforms, such as Villignx to enable account theft and multifactorial authentication code (MFA).

The threat subjects were also noted by setting new mailbox rules to hide malicious activities, theft of sensitive data and even registration of the new Oauth application with excessive permits to establish a constant remote access environment.

Axios is said to have mainly highlighted high -cost goals such as executives, financial officers, accounts and operational transport staff, construction, finance, IT and vertical health.

More than 51% of targeted organizations were estimated successfully between June to November 2024, which violates 43% of the target users’ target accounts.

Cybersecurity

Cybersecurity company said it also revealed a large -scale password spraying company using Node and Go Resty customers, writing at least 13 million entry attempts since June 9, 2024, an average of 66,000 harmful attempts per day. However, the success level remained low, affecting only 2% of the target entities.

Today, more than 178,000 target users’ targeted accounting accounts have been identified, most of which belong to the education sector, in particular, students who are likely to be less protected and may be armed for other companies or sold by different sub ‘The threat.

“The ATO’s threat tools have developed significantly, and the HTTP’s various client tools used to operate the API and the HTTP question,” Akselievich said. “These tools offer different benefits, making the attacks more effective.”

“Given this trend, the attackers are likely to continue to switch between HTTP clients, adaptation of strategies to use new technologies and evading identification, which reflects a broader picture of constant evolution to improve their efficiency and minimize impact.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.