Share this article

Latest news

With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low

Copilot in Outlook will generate personalized themes for you to customize the app

Microsoft will raise the price of its 365 Suite to include AI capabilities

Death Stranding Director’s Cut is now Xbox X|S at a huge discount

Outlook will let users create custom account icons so they can tell their accounts apart easier

Hundreds of Azure cloud accounts compromised, senior execs targeted in latest breach

It’s ongoing and the scale may be higher

2 min. read

Published onFebruary 13, 2024

published onFebruary 13, 2024

Share this article

Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more

As per emerging reports, hundreds of Microsoft Azure accounts have been compromised in an ongoing breach, and critical data has been stolen. This has reportedly affected dozens of environments, and senior executives across several major corporations have been targeted.

According to cybersecurity firm,Proofpoint, the breach is using the same malicious campaign detected in November 2023, which integrates credential phishing and cloud account takeover(CTO)methods. It helps attackers gain access toOfficeHomeand, in turn, the Microsoft 365 apps.

Threat actors are found to have employed proxy services to bypass geographical restrictions as well as mask their true location.

How did the breach happen?

How did the breach happen?

The attackers embedded links into documents, which redirected users to phishing websites. These links usually hadView Documentas the anchor text, which didn’t raise any suspicion.

The attack was meticulously planned and targeted both mid-level and senior employees, though more accounts belonging to the former were compromised.

As perProofpoint, roles such asSales Directors,Account Managers,Finance Managers,Vice President (Operations),Chief Financial Officer & Treasurer, andPresident & CEOwere the common targets.

This allowed the attackers to access information across levels and domains in the organizations.

In such attacks, once the account is compromised, threat actors deploy their ownMFA(Multi-factor authentication)for prolonged access, say adding an alternate mobile number or setting up an authenticator app such that the user can’t regain access.

Besides, attackers remove all evidence of suspicious activity to clear their tracks.

These attacks are aimed at data theft and committing financial fraud. While there is no clear evidence, as of now, to identify the threat actors, it’s believed that these attacks originated from Russia and Nigeria, based on the use of local fixed-line ISPs from these regions.

At present, it’s recommended affected users change their passwords right away, if possible, and that organizations strictly enforce a periodic password change policy.

In the long run, organizations can employsecurity solutionsto bolster the security infrastructure in a bid to thwart such attacks.

More about the topics:Microsoft Azure

Kazim Ali Alvi

Windows Hardware Expert

Kazim has always been fond of technology, be it scrolling through the settings on his iPhone, Android device, or Windows PC. He’s specialized in hardware devices, always ready to remove a screw or two to find out the real cause of a problem.

Long-time Windows user, Kazim is ready to provide a solution for your every software & hardware error on Windows 11, Windows 10 and any previous iteration. He’s also one of our experts in Networking & Security.

User forum

0 messages

Sort by:LatestOldestMost Votes

Comment*

Name*

Email*

Commenting as.Not you?

Save information for future comments

Comment

Δ

Kazim Ali Alvi

Windows Hardware Expert

Kazim is specialized in hardware devices, always ready to remove a screw or two to find out the real cause of a problem.