揭露缓慢而稳定的密码喷洒攻击
Unmasking a slow and steady password spray attack

原始链接: https://petrasecurity.substack.com/p/unmasking-a-slow-and-steady-password

识别用户的潜在恶意首次登录,在没有基线的情况下非常具有挑战性。在一个案例中,成功登录 Microsoft Azure CLI 之前,来自墨西哥同一数据中心的登录失败了。单独来看,这些事件可能是正常的云计算行为,也可能是暴力破解攻击。 然而,对租户范围内的活动进行分析后,发现了一个更广泛的攻击活动。攻击者针对 24 个不同的用户,每个用户最多尝试登录两次,从而躲避暴力破解检测。他们还利用特定范围内的多个 IP 地址来避免基于 IOC 的检测。 多个用户重复的登录失败,加上明显的规避策略,证实这是一次协调一致的攻击。仅仅关注单个用户的活动会掩盖这次攻击。通过将视角转向租户范围内的活动,攻击者的恶意行为才得以暴露。

Hacker News 最新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 揭露缓慢而稳定的密码喷射攻击 (petrasecurity.substack.com) noleary 1小时前 6 分 | 隐藏 | 过去 | 收藏 | 1 评论 giorgioz 7分钟前 [–] 很有趣,但从文章中我没有理解他们是如何将一周内被攻击的 24 个用户组合在一起,并理解这是一次恶意攻击的。 回复 加入我们 6 月 16-17 日在旧金山参加 AI 初创公司学校! 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系我们 搜索:
相关文章

原文

We caught an attack where the first successful login we saw for a user was malicious.

How we could be sure this was an attack? After all, we had no baseline for this user …

Let’s dive in.

This is all the data we had for the user at the time of the attack:

  • 1-26-25: Failed login to Microsoft Azure CLI from Hurricane Electric LLC, a data center in Mexico

  • 1-29-25: Successful login to Microsoft Azure CLI from different IP in the same data center

From just these two logins, it’s pretty tricky to tell whether this is expected behavior or an attack.

On one hand, command line logins usually come from people running cloud computing workloads in data centers. Programmatic workloads also often rotate IPs using tools like FireProx.

On the other hand, this could be an attacker who compromised this account with a brute force script. Perhaps they’re using the data center to run a large scale attack campaign targeting users all over the world.

The key to solving this case is to look beyond this single user and examine all the recent activity in this tenant.

When we look at all the logins for this tenant from Mexico, we see an attack campaign hiding in plain sight: this attacker targeted 24 distinct users using Microsoft Azure CLI.

They tried every user no more than 2 times to avoid setting off any brute force detections.

They also used a slew of IPs from the range 2001:0470:c8e0::/48 to evade any IOC-based detections.

The repeated failed logins across multiple users, combined with clear attempts to avoid triggering alarms, make it clear that this is an attack.

We would have missed this if we just analyzed the activity timelines for each individual user.

Slicing Microsoft’s logs in creative ways allows us to unmask attackers hiding in plain sight. In this particular case, shifting our perspective from user activity to tenant-wide activity was the key.

联系我们 contact @ memedata.com