this post was submitted on 03 Aug 2024
18 points (95.0% liked)

Cybersecurity

5583 readers
143 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
 

I have a question for the hive mind: what is the point of this, exactly?

I mean, I understand the attempt to gain access, and I understand why 2fa codes can be valuable to attempt to phish but that's like, not the thing here.

They just spam dozens to hundreds of these (I'm showing over 400 in my inbox right now) but like, even if I WANTED to give these codes to the attacker, I have no damn clue who the dude in China that's doing this is.

I'm confused as to what they hope to gain by trying over and over and over every couple of hours because it feels like there's no upside to whomever is running this bot, but I probably have missed a memo on some TTP around this, heh.

top 11 comments
sorted by: hot top controversial new old
[–] mholiv@lemmy.world 9 points 2 months ago (1 children)

For the record you should probably change your password. That way they can’t even try.

[–] driving_crooner@lemmy.eco.br 6 points 2 months ago (2 children)

Some Microsoft services don't ask for your password anymore, they just send you a code to your register email.

Yeah it turns out that's what nonsense this is.

Worse, I sure as crap never opted into this, but at least you can turn it off.

What a stupid decision some product manager made.

[–] slazer2au@lemmy.world -3 points 2 months ago (2 children)
[–] Saik0Shinigami@lemmy.saik0.com 8 points 2 months ago

Not when that password is just an email...

[–] Telorand@reddthat.com 2 points 2 months ago

❤️ Passkeys.

[–] slazer2au@lemmy.world 8 points 2 months ago

The thing that I have seen is while it looks like they are after MFA codes, those emails are a distraction from the actual account they are trying to take over, so be very careful when deleting the emails, there could be a legit email in there asking you to roll back an account change.

[–] Anarki_@lemmy.blahaj.zone 1 points 2 months ago

I've been getting these for an account even I can't get back into.

Gonna have to get real granular with my inbox filters to send them into the void...

[–] driving_crooner@lemmy.eco.br 1 points 2 months ago (1 children)

Dosen't Microsoft rate limit the attempts? In that case ypu can just select a random number, the trie to brute force it until the code send is the one selected.

[–] schizo@forum.uncomfortable.business 2 points 2 months ago (1 children)

It doesn't seem all that limited; I'll get 4-5 in a burst, then nothing for a couple of hours or a day or so, then 4-5 more, and so on.

Been ongoing for a couple of months now, and given it's a random 6 digit number, I don't think they're even remotely doing enough attempts to try to brute force it.

[–] driving_crooner@lemmy.eco.br 3 points 2 months ago

If Microsoft accepts, let's say, 3 attempts per code send, they already tried 1200 numbers (per your 400 emails), it's still short to the 10**6 random attempts on average (supposing that the codes are entirely random). If you email is part of a list of a thousand, they already had tried more that a million and got access to some of them.