Article Details
Scrape Timestamp (UTC): 2024-10-31 20:06:48.220
Original Article Text
Click to Toggle View
Microsoft: Chinese hackers use Quad7 botnet to steal credentials. Microsoft warns that Chinese threat actors use the Quad7 botnet, compromised of hacked SOHO routers, to steal credentials in password-spray attacks. Quad7, also known as CovertNetwork-1658 or xlogin, is a botnet first discovered by security researcher Gi7w0rm that consists of compromised SOHO routers. Later reports by Sekoia and Team Cymru reported that the threat actors are targeting routers and networking devices from TP-Link, ASUS, Ruckus wireless devices, Axentra NAS devices, and Zyxel VPN appliances. When the devices are compromised, the threat actors deploy custom malware that allows remote access to the devices over Telnet, which display unique welcome banners based on the compromised device: Other installed, the threat actors install a SOCKS5 proxy server that is used to proxy, or relay, malicious attacks while blending in with legitimate traffic to evade detection. While the botnet had not been attributed to a particular threat actor, Team Cymru tracked the proxy software used on these routers to a user living in Hangzhou, China. Quad7 botnet used for password-spray attacks Microsoft disclosed today that the Quad7 botnet is believed to operate from China, with multiple Chinese threat actors utilizing the compromised routers to steal credentials through password spray attacks. "Microsoft assesses that credentials acquired from CovertNetwork-1658 password spray operations are used by multiple Chinese threat actors," Microsoft says in a new report. "In particular, Microsoft has observed the Chinese threat actor Storm-0940 using credentials from CovertNetwork-1658." When conducting the password spray attacks, Microsoft says the threat actors are not aggressive, only attempting to log in a few times per account, likely to avoid triggering any alarms. "In these campaigns, CovertNetwork-1658 submits a very small number of sign-in attempts to many accounts at a target organization," shared Microsoft. "In about 80 percent of cases, CovertNetwork-1658 makes only one sign-in attempt per account per day." However, once credentials are stolen, Microsoft has observed Storm-0940 utilizing them to breach targeted networks, sometimes on the same day they were stolen. Once the network is breached, the threat actors spread further through the network by dumping credentials and installing RATs and proxy tools for persistence on the network. The ultimate goal of the attack is to exfiltrate data from the targeted network, likely for cyber espionage purposes. To this day, researchers have not determined precisely how the Quad7 threat actors are compromising SOHO routers and other network devices. However, Sekoia observed one of their honeypots being breached by the Quad7 threat actors utilizing an OpenWRT zero-day. "We waited less than a week before observing a notable attack that chained an unauthenticated file disclosure which seems to be not public at this time (according to a Google search) and a command injection," explained Sekoia in July. How the threat actors are breaching other devices remains a mystery.
Daily Brief Summary
Microsoft has identified Chinese threat actors using the Quad7 botnet to conduct password spray attacks and steal credentials.
The Quad7 botnet, initially discovered by Gi7w0rm, primarily comprises compromised SOHO routers from various manufacturers such as TP-Link and ASUS.
Hackers deploy custom malware and SOCKS5 proxy servers on infected devices to facilitate remote access and blend malicious activities with legitimate traffic.
Research linked the proxy software in the botnet to an individual in Hangzhou, China, suggesting geographical origins of the cyberattacks.
These threat actors make minimal login attempts per account to avoid detection, with 80% of attacks only attempting one sign-in per account each day.
Acquired credentials are then used immediately for network infiltration, installing additional RATs and proxy tools to maintain presence and gather more data.
Data exfiltration appears to be the main objective, likely for cyber espionage purposes.
The exact method of initial device compromise remains unclear, though a significant attack leveraged an OpenWRT zero-day, suggesting sophisticated exploit use.