Infostealers Drive Brute-Force Attacks on Corporate SSO Gateways


Infostealers now fuel large-scale brute-force attacks on corporate SSO gateways using stolen employee credentials. Threat actors skip software exploits and log in directly with harvested passwords from infected devices. This campaign targets F5 BIG-IP interfaces and similar edge systems.

Defused Cyber first spotted the activity on February 23, 2026. Their honeypots logged POST requests from IP 219.75.254.166, tied to Japan’s OPTAGE Inc. The attacker tested real corporate email-password pairs at high volume. Precision stood out, as many combos linked to big firms and agencies.

Infostealers.com analysts matched 77% of 70 captured credentials to infostealer logs in Hudson Rock’s database. These came from employee browsers, not F5 breaches. Attackers reuse them against ADFS, STS, and OWA portals. This marks infostealers’ shift to network breaches.

Targeted Organizations

Victims span multinationals and public sectors. Rolls-Royce, Johnson & Johnson, Ericsson, Deloitte, and Cellebrite employees appeared in attack payloads. Law enforcement hit too, including Belgian Police and Queensland Police. Turkish government staff and retail giants also surfaced.

Attackers bet on weak MFA. A single valid login grants footholds. They cast wide nets knowing success rates stay low but profitable.

Attack Infrastructure

The source IP traced to a hijacked Fortinet FortiGate-60E firewall. Open ports 541/tcp and 10443/tcp ran a self-signed SSL cert. Attackers route through compromised edges to hit other edges. This blends stolen IDs with network takeovers for stealth.

Log-to-Lead Pipeline

Infostealers create a “Log-to-Lead” flow. Malware grabs browser credentials like SSO masters from infected machines. Logs aggregate by corporate value and sell to access brokers on dark web markets.

Brokers stuff them into SSO targets until hits occur. “Functional equivalence” powers this. ADFS passwords often double as VPN or gateway keys. Attackers enter via front doors with employee keys.

StageActionOutput
InfectionSteals browser credsRaw logs with domains
AggregationFilters high-value firmsBundled credential sets
SaleDark web marketplacesPackages to brokers
StuffingBrute-force SSO edgesNetwork access
Confirmations of the compromised credentials (Source – Infostealers)

Defense Measures

Enforce phishing-resistant MFA on all SSO and edge devices. Monitor dark web feeds for exposed employee creds. Ban password reuse in policies.

  • Deploy endpoint tools to block infostealers early.
  • Train staff against browser password saves.
  • Audit F5 BIG-IP and ADFS for shared logins.

Defused Cyber tweeted the alert on X. Infostealers.com detailed the pipeline (infostealers.com/article/how-infostealers-industrialize-the-brute-forcing-of-corporate-sso-gateways).

FAQ

What started this detection?

Defused Cyber honeypots caught brute-force POSTs to F5 devices on February 23, 2026.

Which groups got hit?

Rolls-Royce, Deloitte, Ericsson, police forces in Belgium and Queensland, plus Turkish ministries.

How do infostealers feed attacks?

They harvest browser creds, sell high-value sets, then brokers stuff SSO gateways.

What IP ran the brute-force?

219.75.254.166 from a compromised Japanese FortiGate firewall.

How to stop credential reuse risks?

Use phishing-resistant MFA, dark web monitoring, and endpoint detection.

Where’s the official alert?

Defused Cyber on X

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages