
The abuse of real user credentials turns identity data into a direct attack vector, forcing enterprises to rethink perimeter security and enforce robust, universal MFA.
The recent campaign uncovered by Defused Cyber illustrates a maturing threat model where attackers bypass traditional perimeter defenses by buying real user credentials harvested by Infostealers such as RedLine, Raccoon, and Vidar. Instead of exploiting software bugs, threat actors aggregate browser‑saved SSO and ADFS logins from infected employee devices, sell them on underground markets, and then launch high‑volume credential‑stuffing attacks against corporate edge appliances like F5 BIG‑IP. This “identity as the new perimeter” approach turns stolen passwords into direct entry points, dramatically reducing the need for sophisticated exploit development.
The breach affected credentials from high‑profile organizations across aerospace, pharmaceuticals, telecom and law‑enforcement sectors, demonstrating that even well‑resourced enterprises are vulnerable when password reuse or weak multi‑factor authentication (MFA) persists. Defenders observed that a single compromised Fortinet firewall in Japan served as a proxy, amplifying the attack surface by routing traffic through hijacked network‑edge devices. These findings compel security teams to move beyond patch management toward continuous identity monitoring, dark‑web exposure checks, and enforcing MFA on every SSO gateway, regardless of perceived internal trust.
Mitigation strategies now focus on reducing credential exposure at the source. Organizations should deploy endpoint detection and response solutions capable of identifying Infostealer activity, enforce strict browser credential storage policies, and regularly rotate privileged passwords. At the network level, zero‑trust architectures that require re‑authentication for each service, coupled with adaptive MFA that challenges anomalous login patterns, can thwart large‑scale stuffing attempts. Finally, threat‑intelligence sharing about compromised infrastructure, such as the hijacked FortiGate observed in this campaign, enables faster blocklisting and limits the use of compromised devices as attack proxies.
Comments
Want to join the conversation?
Loading comments...