Quad7 Activity, also known as CovertNetwork-1658 or the 7777 Botnet, is a network of compromised small office/home office (SOHO) routers. [1] [2] The botnet was initially composed primarily of TP-Link routers and was named Quad7 due to compromised devices exposing TCP port 7777 with the distinctive banner xlogin. Later activity showed a significant increase in compromised Asus routers and the addition of new ports and banners, including TCP port 63256 displaying alogin. Quad7 infrastructure functions as a collection of egress IPs that various China-affiliated threat actors have used to conduct password-spraying and brute-force operations. [1][3] Microsoft has reported that Storm-0940 leveraged credentials obtained through Quad7 Activity to target organizations in North America and Europe, including government agencies, non-governmental organizations, think tanks, law firms, energy firms, IT providers, and defense industrial base entities. [2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
Quad7 Activity has used the same User Agents of |
| .002 | Application Layer Protocol: File Transfer Protocols |
Quad7 Activity has used a File Transfer Protocol (FTP) server to download malicious binaries.[2] |
||
| Enterprise | T1110 | .003 | Brute Force: Password Spraying |
Quad7 Activity has conducted a throttled variant of password spraying techniques that only utilized a single attempt to sign in within a 24-hour time period, eluding brute force detection thresholds.[2] |
| Enterprise | T1059 | .004 | Command and Scripting Interpreter: Unix Shell |
Quad7 Activity has enabled the creation of an access-controlled command shell |
| Enterprise | T1584 | .005 | Compromise Infrastructure: Botnet |
Quad7 Activity has compromised various branded SOHO routers to form a botnet that has been leveraged in password spraying activity.[1][2] |
| .008 | Compromise Infrastructure: Network Devices |
Quad7 Activity has compromised network devices, such as IP cameras, Network Attached Storage (NAS) devices, and SOHO routers, to leverage for follow-on activity.[2][5] |
||
| Enterprise | T1190 | Exploit Public-Facing Application |
Quad7 Activity has enabled the exploitation of vulnerabilities for remote code execution capabilities in SOHO routers including CVE-2023-50224 and CVE-2025-9377 in TP-Link devices.[2][4] |
|
| Enterprise | T1589 | .002 | Gather Victim Identity Information: Email Addresses |
Quad7 Activity has gathered targeted individual’s e-mail addresses for the password spraying attempts.[3] |
| Enterprise | T1665 | Hide Infrastructure |
Quad7 Activity has rotated the compromised SOHO IPs used in password spraying activity to hamper detection and network blocking activities by defenders.[2] |
|
| Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Quad7 Activity has disabled the TP-Link management interface for TP-Link by killing the |
| Enterprise | T1105 | Ingress Tool Transfer |
Quad7 Activity has downloaded additional binaries from a remote File Transfer Protocol (FTP) server to compromised devices.[2] |
|
| Enterprise | T1571 | Non-Standard Port |
Quad7 Activity has used non-standard TCP ports – such as 7777, 11288, 63256, 63210, 3256, and 3556 for C2.[2][5] |
|
| Enterprise | T1027 | .011 | Obfuscated Files or Information: Fileless Storage |
Quad7 Activity has infected victim network devices by storing artifacts in the |
| Enterprise | T1090 | .002 | Proxy: External Proxy |
Quad7 Activity has initialized SOCKS5 proxies on compromised devices.[2][1] |
| .003 | Proxy: Multi-hop Proxy |
Quad7 Activity has routed traffic through chains of compromised network devices for password spray attacks.[2] |
||