Infostealers Drive Massive Brute-Force Attacks on Corporate SSO Gateways with Stolen Credentials


The cybersecurity community is witnessing a rise in credential‑stuffing attacks targeting corporate Single Sign‑On (SSO) systems, with recent campaigns focusing on F5 BIG‑IP devices.

To understand the source of the stolen logins, Defused Cyber analyzed a dataset of 70 unique email‑password pairs used in the attack.

When cross‑referenced with Hudson Rock’s cybercrime database of Infostealer infections, 54 of the credentials (77%) were confirmed matches a clear link between Infostealer‑harvested data and brute‑force attempts on corporate SSO infrastructure.

The credentials weren’t stolen from F5 systems directly. Instead, they were extracted from compromised employee devices infected with malware such as RedLine, Raccoon, or Vidar, which collect browser‑saved credentials.

The activity was first identified by Defused Cyber, whose honeypots captured malicious POST requests attempting to authenticate using seemingly legitimate enterprise credentials. One notable attack originated from IP 219.75.254.166 (AS17511, OPTAGE Inc., Japan).

Threat actors then repurpose these for large‑scale credential stuffing against corporate portals like ADFS, OWA, and STS counting on password reuse or weak MFA enforcement.

The “Log‑to‑Lead” Pipeline

This campaign reflects a larger industrialized process where identity theft becomes the main point of entry:

  1. Infection: An employee’s system is infected by an Infostealer. Browser‑stored credentials, including SSO and ADFS logins, are silently exfiltrated.
  2. Marketplace: Logs are aggregated and sold on underground markets to Initial Access Brokers (IABs).
  3. Front‑Door Bypass: Attackers repurpose those credentials against corporate edge systems like F5 BIG‑IP, exploiting their role in authentication.
  4. Network Compromise: Valid credentials allow direct access logging in, not hacking in.

This “identity as the new perimeter” model illustrates how attackers bypass technical defenses by exploiting password equivalence across multiple systems.visual confirmations of the compromised credentials for Doka, the Belgian Police, Ericsson, and Majid Al Futtaim:

Evidence of Infostealer infection linked to Belgian Police credentials (Source : Infostealers).

Analysis revealed that employee credentials from major enterprises and government entities were part of the attempted login payload. Affected domains included:

OrganizationSectorCompromised Domain

OrganizationSectorCompromised Domain
Rolls‑RoyceAerospace & Defense@ps.rolls-royce.com
Johnson & JohnsonPharmaceuticals@its.jnj.com
EricssonTelecommunications@ericsson.com
DeloitteProfessional Services@deloitte.com
Belgian PoliceLaw Enforcement@police.belgium.eu
Queensland PoliceLaw Enforcement@police.qld.gov.au
Majid Al FuttaimRetail / Conglomerate@maf.ae
CellebriteDigital Intelligence@cellebrite.com
DokaEngineering@doka.com
Turkish Ministry of TradeGovernment@ticaret.gov.tr

These findings suggest attackers are relying on sheer volume and statistical success casting a wide net across multiple high‑value targets, expecting at least one credential pair to bypass MFA or trigger user fatigue.

Defenders can no longer rely solely on patch management or device hardening. Protection now demands continuous identity monitoring, dark‑web exposure tracking, and strict MFA enforcement across all perimeter access points.

Hijacked Infrastructure as Attack Proxies

Further analysis of the source IP revealed a compromised Fortinet FortiGate‑60E firewall hosted by OPTAGE Inc., Japan.

The device exposed open ports 541/tcp and 10443/tcp, using a self‑signed SSL certificate. This means attackers may be launching assaults from hijacked network edge devices, effectively turning one organization’s firewall into another’s attack proxy.

This campaign demonstrates how cybercriminal operations have evolved from exploitation to authentication abuse.

Instead of breaching networks via vulnerabilities, attackers purchase Infostealer logs containing real corporate credentials and deploy them in large‑scale brute‑force campaigns.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.





Source link