Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Botnet Blues: Chinese Hackers Target Microsoft 365 with Password Spraying Chaos
A botnet linked to China is targeting Microsoft 365 accounts with password spraying attacks. Fueled by over 130,000 compromised devices, it sneaks past MFA using non-interactive sign-ins and Basic Authentication. This stealthy attack highlights the immediate threat posed to vulnerable systems, as Microsoft works to phase out Basic Authentication.

Hot Take:
Looks like Microsoft’s Microsoft 365 accounts have joined a new club they never signed up for – the “Botnet Bash”! With 130,000 uninvited guests crashing the party, it’s like a digital rager where everyone’s sharing one password instead of one drink. Who knew authentication could be this wild?
Key Points:
- A botnet linked to a Chinese threat actor is targeting Microsoft 365 accounts via large-scale password spraying attacks.
- The botnet leverages over 130,000 compromised devices and exploits non-interactive sign-ins with Basic Authentication.
- Basic Authentication’s vulnerability lies in transmitting credentials in plain form, making it a juicy target for attackers.
- These stealthy attacks often go unnoticed by security teams due to logs not being monitored.
- The botnet, suspected to be controlled by a Chinese group, uses credentials obtained from information-stealer malware.