Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Why I Switched From iPhone Hotspot to a 5G Travel Router for Good

    Nisan 18, 2026

    Apple AirTags Revisited After 5 Years: How They Stack Up Today

    Nisan 18, 2026

    Verizon Offers Free iPad or Apple Watch With New iPhone Purchase: Here’s How It Works

    Nisan 18, 2026
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Why I Switched From iPhone Hotspot to a 5G Travel Router for Good

      Nisan 18, 2026

      Verizon Offers Free iPad or Apple Watch With New iPhone Purchase: Here’s How It Works

      Nisan 18, 2026

      How to Use AI Safely at Work: 4 Practical Tips

      Nisan 18, 2026

      Turn an Old Tablet into a Smart Home Control Hub

      Nisan 18, 2026

      Gemini Mac App Tested: Key Edge Over Web Version

      Nisan 18, 2026
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » Hacked TP-Link Routers Targeting Azure Accounts in Mass Attack
    Tech

    Hacked TP-Link Routers Targeting Azure Accounts in Mass Attack

    By ayaksızKasım 5, 2024Yorum yapılmamış1 Min Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Microsoft recently warned of an ongoing threat involving a botnet that has been conducting password-spraying attacks against its Azure cloud service for over a year. The attack, linked to Chinese government hackers, utilizes a network of more than 16,000 compromised TP-Link routers worldwide to hijack Azure accounts.

    Password spraying is a stealthy brute-force method where attackers make numerous login attempts from various IP addresses, complicating detection. Although the botnet, initially named Botnet-7777 and now referred to as CovertNetwork-1658 by Microsoft, is still operational, only about 8,000 of its devices remain active.

    Microsoft’s officials highlighted the potential for widespread credential compromise, stating that “any threat actor using the CovertNetwork-1658 infrastructure could conduct password spraying campaigns at a larger scale.” The group Storm-0940 has been identified as a user of this infrastructure, targeting organizations including think tanks and law firms across multiple regions.

    Once attackers gain access to an Azure account, they seek to spread their control across the network, stealing data and creating backdoors for ongoing access. This ongoing threat underscores the need for heightened security measures within cloud services to protect sensitive information.

    Feel free to choose either option or let me know if you would like any adjustments!

    Post Views: 258
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    ayaksız
    • Website

    Related Posts

    Why I Switched From iPhone Hotspot to a 5G Travel Router for Good

    Nisan 18, 2026

    Verizon Offers Free iPad or Apple Watch With New iPhone Purchase: Here’s How It Works

    Nisan 18, 2026

    How to Use AI Safely at Work: 4 Practical Tips

    Nisan 18, 2026
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2026 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.