1. Home
    2. /Massive ISP Breach: Hackers Use Brute-Force Attacks to Deploy Malware

    Massive ISP Breach: Hackers Use Brute-Force Attacks to Deploy Malware

    Hackers breach 4K ISP networks using brute-force attacks to deploy malware and crypto miners, raising cybersecurity alarms.

    Updated Mar 04, 2025
    News Room

    Author by

    News Room

    Massive ISP Breach: Hackers Use Brute-Force Attacks to Deploy Malware

    In a shocking revelation, over 4k internet service provider (ISP) networks in China and on the West Coast of the U.S.  have been targeted by cyberhackers. These information hackers mainly use brute-force technology to gain victim’s system access and deploy the malware and cryptocurrency miners.

    Cyber attacks are not new to the crypto market, but they always leave investors and platforms to recheck their security systems. But there is a saying: “Mistakes are bound to happen despite precautions” Let’s get into the new hacking story.

    According to the Splunk Threat Research Team, the attackers are operating with minimal traces to avoid getting caught. They are using scripting languages such as Python and PowerShell to run their malicious activities. Additionally, they use Telegram API for command-and-control (C2) operations, making it harder to trace their actions.

    How the Attack Works

    Cybercriminals are gaining access to systems by performing brute-force attacks on weak credentials. These efforts have been mapped back to IP addresses in Eastern Europe. After gaining entry, the attackers release malware that can steal sensitive information while at the same time installing cryptocurrency mining tools like XMRig.

    Before initiating mining operations, the hackers methodically disable security features and eliminate any software that would expose their activities. The malware is capable of taking screenshots and can copy the crypto wallet details by hacking the clipboard contents. This nefarious tactic means that innocent users who carelessly copy and paste wallet addresses stand to have their funds quietly redirected to the attackers.

    Tools Used in the Attack

    Once access is gained, the attackers use various tools to expand their reach and strengthen their control over the compromised systems. Some of the key tools include:

    • Auto.exe – Downloads a password list (pass.txt) and a list of IP addresses (ip.txt) from a C2 server to execute further brute-force attacks.
    • Masscan.exe – A powerful scanning tool that scans large numbers of IP addresses to find vulnerable systems.

    Masscan Tool Used for Large-Scale Scanning

    Masscan is a sophisticated tool that can scan thousands of IP addresses in a short period. This advanced technology tool is used to target certain ISP infrastructures. Hackers use this method to identify the weak spots. After finding these blind spots, hackers take the lead and launch brute-force attacks to break the system’s security and steal the user’s data. 

    What This Means for Internet Users

    This large-scale attack shows that cybercriminals are continuously evolving their methods to exploit weak security. ISPs and businesses need to strengthen their security measures by:

    • Enforcing strong password policies.
    • Regularly updating security patches.
    • Monitoring network activity for unusual behavior.
    • Using multi-factor authentication (MFA) to prevent unauthorized access.

    Future Action

    The cyberattack on ISPs in the U.S. and China is a serious threat, which resembles the North Korean hackers team. Crypto platforms and investors must take immediate action against these illegal malware installations to protect user data and prevent financial loss. With hackers using sophisticated tools and strategies, cybersecurity measures need to evolve just as quickly to prevent future attacks.