{"id":45441,"date":"2026-04-15T22:23:50","date_gmt":"2026-04-15T14:23:50","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/researchers-spot-surge-in-brute-force-attacks-from-middle-east-infosecurity-magazine\/"},"modified":"2026-04-15T22:23:50","modified_gmt":"2026-04-15T14:23:50","slug":"researchers-spot-surge-in-brute-force-attacks-from-middle-east-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/researchers-spot-surge-in-brute-force-attacks-from-middle-east-infosecurity-magazine\/","title":{"rendered":"Researchers Spot Surge in Brute-Force Attacks from Middle East &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>Security researchers have detected a &ldquo;sharp rise&rdquo; in brute-force attempts to hijack SonicWall and Fortinet devices, with the vast majority (88%) appearing to come from the Middle East.<\/p>\n<p>Barracuda said most of these attempts were unsuccessful as they were either blocked outright by security tools or directed at invalid usernames.&nbsp;<\/p>\n<p>Although these attacks may simply have been routed through servers and networks in the region, the timing would seem to coincide with <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/iran-cyber-attacks-global-google\/\" target=\"_self\">US and Israeli hostilities against Iran<\/a>.<\/p>\n<p>There have been various reports of attacks from Iranian-affiliated hackers over recent weeks, including raids against <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/iranbacked-hackers-cni-ot-assets\/\" target=\"_blank\">US critical infrastructure providers<\/a> and&nbsp;<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/iran-massive-wiper-attack-medtech\/\" target=\"_blank\">medtech firms.<\/a><\/p>\n<p>The line between state-backed efforts and financially motivated cybercrime is increasingly blurred, as evidenced by the re-emergence of the <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/iranlinked-pay2key-ransomware\/\" target=\"_blank\">Pay2Key ransomware group.<\/a><\/p>\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/middle-east-conflict-surge-global\/\" target=\"_blank\"><em>Read more on Middle East threats: Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity.<\/em><\/a><\/p>\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/half-ransomware-access-hijacked\/\" target=\"_blank\">Edge devices<\/a> such as the VPNs and firewall appliances manufactured by vendors like <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/sonicwall-ssl-vpn-attacks-escalate\/\" target=\"_blank\">SonicWall <\/a>and <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/russian-threat-actor-genai\/\" target=\"_blank\">Fortinet <\/a>are a popular target for attack given that they are internet-facing but also provide a foothold inside corporate networks.<\/p>\n<p>Barracuda said over half (56%) of all confirmed incidents from February to March related to this type of brute-force attack.<\/p>\n<p>&ldquo;Attackers are aggressively scanning and testing perimeter devices for weak or exposed credentials,&rdquo; warned Barracuda senior cybersecurity analyst, Laila Mubashar. &ldquo;Even when attacks fail,&nbsp;persistent probing raises the risk&nbsp;that a single weak password or misconfiguration could lead to compromise.&rdquo;<\/p>\n<p>She urged organizations to:<\/p>\n<ul>\n<li>Enforce strong, unique passwords on all network and security devices<\/li>\n<li>Enable multi-factor authentication (MFA) on all VPNs, firewalls and remote access services<\/li>\n<li>Monitor and investigate repeated failed login attempts<\/li>\n<li>Restrict management interfaces to trusted IP ranges where possible<\/li>\n<\/ul>\n<h2><strong>Rise in ClickFix Attacks<\/strong><\/h2>\n<p>Barracuda also sounded the alarm over a surge in a category of social engineering attacks known as <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/clickfix-attacks-surge-2025\/\" target=\"_blank\">&ldquo;ClickFix,&rdquo;<\/a> in which users are tricked into copying and executing a malicious script in a bid to fix a non-existent technical issue.<\/p>\n<p>Mubashar explained that such attacks exploit user trust and anxiety.<\/p>\n<p>&ldquo;The attackers use familiar elements and language such as pop-ups, prompts and running a fix,&rdquo; she added. &ldquo;Because ClickFix attacks rely on duping users into adding malicious commands themselves, such attacks are harder for automated security systems to spot.&rdquo;<\/p>\n<p>Organizations should improve end-user education, restrict who can run PowerShell, scripts or command-line tools, and deploy tools to monitor for unusual behavior, Barracuda <a href=\"https:\/\/blog.barracuda.com\/2026\/04\/14\/soc-threat-radar-april-2026\" target=\"_blank\">advised<\/a>.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have detected a &ldquo;sharp rise&#038; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-45441","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45441"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45441\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}