Last Updated: 2014-09-07 23:43:02 UTC
by Johannes Ullrich (Version: 1)
This isn't something new, but I think it is often overlooked: "slow and low" password brute forcing.
One of the daily reports I like to look at is password brute force attempts. more or less "forever", A few networks stick out in these daily reports. The password brute force attempts are not particularly agressive, with usually less then 10 attempts per day from any particular IP address. The other odd thing is that the accounts being brute forced don't exist, which a heave focus on "@hotmail.com" accounts.
By far the most agressive network is 220.127.116.11/22,"Besthosting" in the Ukraine, followed by an other Ukraining network, 18.104.22.168/24 (Steephost).
The top brute forced domains:
zfymail.com <- this domain is associated with many bots/spam messages.
The intend isn't perfectly clear as the accounts don't exist, and the attempts are not very aggressive (maybe to avoid getting locked out?).
Anybody observing similar attacks and able to figure out what they are after?