Home » Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts

Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts

by Samantha Rowland
2 minutes read

In a concerning trend, cybercriminals are upping their game by utilizing legitimate HTTP client tools to carry out account takeover (ATO) attacks within Microsoft 365 environments. According to the findings of enterprise security firm Proofpoint, these malicious actors have been orchestrating campaigns employing HTTP clients like Axios and Node Fetch. Their objective? To seamlessly send HTTP requests and obtain corresponding HTTP responses from web servers, all in the pursuit of executing ATO attacks.

Proofpoint’s observations shed light on the evolving tactics employed by cybercriminals to breach security measures. By leveraging tools such as Go Resty and Node Fetch, these bad actors can mask their activities under the guise of legitimate HTTP traffic. This not only enables them to fly under the radar but also complicates the detection of their nefarious actions.

The scale of this threat is made apparent by the staggering number of password spraying attempts detected. With over 13 million such attacks recorded, it is evident that cybercriminals are relentless in their efforts to exploit vulnerabilities and gain unauthorized access to sensitive information within Microsoft 365 environments.

What makes this approach particularly insidious is the fact that these HTTP client tools are widely used in legitimate software development. As such, their presence alone may not immediately raise red flags for security teams. This underscores the importance of implementing robust security measures that go beyond traditional threat detection methods.

To combat this growing threat, organizations must adopt a multi-layered approach to cybersecurity. This includes implementing strong authentication mechanisms, monitoring for suspicious activities, and staying informed about the latest tactics employed by cybercriminals. By staying vigilant and proactive, businesses can better protect themselves against ATO attacks and safeguard their valuable data.

As the cybersecurity landscape continues to evolve, it is essential for organizations to stay ahead of emerging threats. By understanding the tactics and tools used by cybercriminals, businesses can strengthen their defenses and mitigate the risk of falling victim to ATO attacks. Remember, when it comes to cybersecurity, knowledge is power. Stay informed, stay prepared, and stay secure.

You may also like