A large-scale brute force password attack using almost 2.8 million IP addresses is underway, attempting to guess the credentials for a wide range of networking devices, including those from Palo Alto Networks, Ivanti, and SonicWall.
I have commentary on this from a variety of experts. Starting with Erich Kron, Security Awareness Advocate at KnowBe4:
“VPNs are a great target for bad actors because in a corporate world, they can lead to direct access to the network behind the protection of firewalls and other edge security devices. If these bad actors are able to guess or brute force the VPN password, cybercriminals could attempt anything from data theft to ransomware, or more. In many cases, cybercriminals could simply sell this network access to other bad actors as well, pocketing the cash and letting the buyer do whatever nefarious deeds they would like.”
“These types of attacks trying to break into networks though VPNs are often driven by processes such as ‘password spraying,’ which is using a predefined list of simple or common passwords, and a list of known email addresses or usernames, or through ‘credential stuffing,’ which is using a list of usernames and passwords stolen in other data breaches or by tricking employees to give up credentials through fake login portals. The use of MFA, or some other sort of secondary authentication technology, can help stop the ability of bad actors to log in, however, it is not foolproof.”
“By using so many IP addresses that are scattered throughout the globe to carry out these attacks, the cybercriminals can make it extremely difficult for defenders to stop the brute force attacks attempting to pierce the protections put in place by targeted organizations. These source IP addresses are often from individual computers infected with malware, IoT devices that have been compromised, or out of date consumer routers or internet facing devices that attackers have already taken over.”
“These sorts of attacks stress the importance of educating employees about good password hygiene, including not reusing passwords that may have been stolen in other breaches, and the need for a second factor of authentication for any important accounts, especially those that can access the organization from the internet.”
Next up is Chris Hauk, Consumer Privacy Champion at Pixel Privacy:
“Brute force password attacks have long been and will continue to be, a popular method of attacking systems, websites, VPN appliances, and other password-protected devices. While there are more sophisticated ways to perform attacks, hackers depend on the fact that their targets haven’t been kept updated to the latest software, firmware, or operating system versions, or that the device’s logins aren’t protected with two-factor or multi-factor authentication methods.”
Finally we have Brian Higgins, Security Specialist at Comparitech:
“This uptick in high-volume activity is symptomatic of the monetary allure that access dangles in front of cyber-criminal enterprises. Although such a massive brute-force endeavor smacks a little of the old ‘spray and pray’ methodology, the sheer volume and potential value of online targets these days makes the whole thing worthwhile. If anyone still hasn’t switched to Two or Multi Factor authentication or is adamantly clicking ‘ask me later’ when they see an update prompt, then this should be their final warning. There is research that says we will hit 75 billion connected devices in 2025 so Bot-Nets will only get bigger and from a criminal’s point of view, there’s no point letting them sit idle.”
Solutions such as MFA/2FA as well as totally passwordless solutions are no longer optional based on an attack like this one. Because when attacks like this one succeed, they have grave consequences for the organization at the receiving end.
UPDATE: Darren James, Senior Product Manager at Specops Software, commented:
“Brute Force attacks aren’t usually very sophisticated, but this example does certainly seem to demonstrate a well-planned and determined attack against its potential victims using such a large number of compromised devices based all over the globe.
The benefit of a brute force attack of this nature is that it’s in no hurry to crack the security of a specific individual, but instead targets hundreds, thousands maybe even millions of individual user accounts, trying to connect using a list of already known breached passwords, once it finds a match it might then proceed to deliver a payload or it may just keep that user/password pair to one side to be used later or sold on to the highest bidder.
This process usually takes a lot of time, but by simultaneously using 2.8 million devices they can certainly speed up this type of attack and the amount of positive “hits” they get.
From our own recent research we found that “admin” was still one of the most common base terms used in breach passwords, so it’s vitally important to make sure that the admin interfaces of these VPN and Firewall servers and devices that are being targeted are not using easily guessable passwords or default passwords set by their manufacturers.
Even if those passwords have been changed, organizations should also continuously scan to make certain that the passwords that have been set haven’t themselves become breached.
Implement MFA on these devices. This can be done using RADIUS authentication if there’s no secure built-in 2FA option, and finally consider whether you need to expose the admin interface externally, usually this is not a good idea, but could have been left over from a support session.”
This is also being reported by Bleeping Computer and has been tracked by The Shadowserver Foundation.
UPDATE #2: Lawrence Pingree, VP, Dispersive adds this:
This problem is solved by separating the control plane and data plane for VPNs and transport infrastructure, as we do. A recent analysis of 2024 breaches found that over 56% of enterprises experienced an attack related to their VPNs (report link: https://blog.dispersive.io/vpns-under-siege-2024-cyber-attacks-data-breach-in-review ). I do not think most Zero Trust providers are immune to this same style of attack.
Taking Major Business Momentum in 2025, Datadobi Reimagines How Enterprises Can Transform Unstructured Data into a Valuable Asset
Posted in Commentary with tags Datadobi on February 11, 2025 by itnerdDatadobi, a global leader in unstructured data management, has today set out its vision to capture its place in the Unstructured Data Management market, propelled by 12 months of outstanding performance, technology innovation, and industry recognition. As organizations look to release the value of unstructured data across their hybrid cloud environments, Datadobi is ideally positioned to address their needs and transform it into a valuable asset that drives innovation and success.
As Gartner® quoted in its Modernizing File Storage Data Services with Hybrid Cloud report* at the end of 2024, “ New hybrid cloud storage capabilities are now considered ‘must have’ to address the growing challenges of exponential data growth, digitalization and globalization of data, generative AI, resilience, cloud integration and migration.”
To deliver on these growing challenges, technology leaders worldwide are focusing on their storage infrastructure to prepare for generative AI and other strategic IT priorities. This includes investment in effective hybrid-cloud strategies, which is now a key requirement for addressing ubiquitous data growth. With limited mature HCDS solutions on the market, Datadobi has built customer trust in the value of effective data management, building a software platform that reimagines how organizations can navigate data complexities, optimize business intelligence, and find a competitive edge.
Datadobi’s leadership position in the Unstructured Data Management market has been established following a range of significant business achievements over the last 12 months, which include:
StorageMAP 7.0 – a game-changer for the Unstructured Data Management market
StorageMAP 7.0 is a game-changer for the Unstructured Data Management market, with previously unheard-of features and functionality to provide the deepest insights possible into heterogeneous unstructured data environments. The solution enables customers to make the most intelligent data-driven decisions that drive innovation and competitive advantage with StorageMAP 7.0 while also managing their unstructured data’s inherent risk and escalating costs as never before.
Award-winning achievements and analyst recognition
A series of industry award wins underlined Datadobi’s exceptional performance in 2024. These included the Cloud Computing Magazine Excellence and ChannelVision Visionary Spotlight awards. The company also made CRN’s Big Data 100 and Storage 100 lists. In addition, Denise Natali, Datadobi’s Vice President of Americas Sales, was included on CRN’s “100 People You Don’t Know But Should” list.
The company was also featured in several key industry analyst reports, including Gartner’s “Modernize File Storage Data Services With Hybrid Cloud.” Additionally, Omdia recognized Datadobi’s StorageMAP platform for offering “comprehensive unstructured data management” capabilities and noted, that “Datadobi’s ability to handle unstructured data (documents, emails, social media posts, images, videos, audio files, sensor data, etc.) puts it above most other solutions.”
A growing international team
In 2024, Datadobi also strategically expanded its team, adding key sales leadership personnel, including Denise Natali as Vice President of Americas Sales, Michelle Butler as California Sales Executive, and other new personnel across the USA and EMEA. These strategic hires across multiple regions are central to the company’s commitment to growth and have significantly enhanced its capabilities in key target markets.
Leave a comment »