Greasy Opal: 750 million fake accounts vs. real users

Friend

Professional
Messages
2,672
Reaction score
928
Points
113
How do stealth bots cheat CAPTCHAs?

According to a recent report by Arkose Labs, cyberspace has recently seen an increase in the use of the Greasy Opal tool, which is used to carry out sophisticated attacks, including volumetric bot attacks. This machine learning-based tool allows attackers to carry out large-scale attacks, including those aimed at bypassing CAPTCHA systems.

An example of such actions is the recent attack organized by the Storm-1152 group, based in Vietnam. Using Greasy Opal, attackers created 750 million fake Microsoft accounts. In response, Microsoft's cybercrime unit has managed to take control of the domains used by Storm-1152 twice in recent months, first in December 2023 and then again in August this year.

The target of such attacks is the digital accounts of real users. Attackers are trying to hack security systems when logging into accounts and massively create fake accounts. Greasy Opal uses advanced computer vision technology and sophisticated machine learning algorithms to bypass existing protections.

According to Arkose Labs founder and CEO Kevin Gosschalka, this tool makes it much easier to execute sophisticated attacks by lowering the barrier to entry for potential cybercriminals.

Companies like Greasy Opal often masquerade as legitimate ventures with professional websites and marketing. However, their products can be used for dubious purposes, making them particularly dangerous, Gosschalk notes.

"Previously, in order to use bots to attack the largest companies in the world, attackers needed serious development skills, but now this is not the case. Now anyone can purchase a ready-made advanced bot tool with training and support to start a career as a cybercriminal," Gosschalk emphasized.

Volumetric bot attacks and fake accounts are a growing threat to traditional defenses, especially with tools like Greasy Opal. These attacks are characterized by a constant flow of malicious traffic, which creates unique challenges for security systems.

Goschalk emphasizes that businesses can better defend themselves by implementing AI-based threat mitigation strategies and innovative defense mechanisms that evolve with the changing cyber threat landscape.

To successfully counter today's AI-driven bot attacks, enterprises need to employ comprehensive security strategies that include not only content delivery networks and firewalls, but also account access control systems that can distinguish legitimate digital identities from fake ones.

Source
 
Top