Common Information
Type Value
Value
7777-Botnet
Category Tool
Type Botnet
Misp Type Cluster
Description 7777-Botnet has been observed brute forcing Microsoft Azure instances via Microsoft Azure PowerShell bruteforcing. The botnet has a unique pattern of opening port 7777 on infected devices, returning an “xlogin:” message. The botnet has been used for low-volume attacks against targets of all industry sectors at a global scale, almost exclusively targeting C-Level employee logins. Due to the very low volume of around 2–3 login requests per week, the botnet is able to evade most security solutions.
Details Published Attributes CTI Title
Details Website 2024-01-18 13 7777-Botnet Infection Vectors - Blog - VulnCheck
Details Website 2023-10-23 10 Risky Biz News: Cisco IOS XE hackers are hiding their tracks as patches come out