Saturday, 11 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > Ongoing Azure Hacking Campaign Targets Senior Execs | DCN
Cloud Computing

Ongoing Azure Hacking Campaign Targets Senior Execs | DCN

Last updated: February 13, 2024 4:32 pm
Published February 13, 2024
Share
Corporate Microsoft Azure accounts are falling prey to spear-phishing attacks
SHARE

This article originally appeared in Dark Reading

Dozens of environments and tons of of particular person consumer accounts have already been compromised in an ongoing marketing campaign focusing on Microsoft Azure corporate clouds.

Associated: What Does a ‘Cybersecurity Tradition’ Truly Entail?

The exercise is in some methods scattershot – involving information exfiltration, monetary fraud, impersonation, and extra, towards organizations in all kinds of geographic areas and business verticals – but in addition very honed, with tailored phishing directed at extremely strategic people alongside the company ladder.

“Whereas attackers could seem opportunistic of their method, the in depth vary of post-compromise actions suggests an rising degree of sophistication,” a Proofpoint consultant tells Darkish Studying. “We acknowledge that menace actors exhibit adaptability by choosing applicable instruments, ways, and procedures (TTPs) from a various toolkit to go well with every distinctive circumstance. This adaptability displays a rising development throughout the cloud menace panorama.”

Company Cloud Compromise

Associated: Sweden’s Riksbank Turns to Police Following Cyber-Assault On Tietoevry Information Middle

The continued exercise dates again not less than just a few months to November, when researchers first noticed suspicious emails containing shared paperwork.

The paperwork usually use individualized phishing lures and, usually, embedded hyperlinks that redirect to malicious phishing pages. The objective in every case is to acquire Microsoft 365 login credentials.

What stands out is the diligence with which the assaults goal completely different, variously leverageable staff inside organizations.

Some focused accounts, as an example, belong to these with titles equivalent to account supervisor and finance supervisor – the sorts of mid-level positions more likely to have entry to helpful sources or, not less than, present a base for additional impersonation makes an attempt greater up the chain.

See also  CloudTech News | The intersection of cloud computing and digital signage

Different assaults goal straight for the pinnacle: vice presidents, CFOs, presidents, and CEOs.

Clouds Collect: Cyber Fallout for Organizations

With entry to consumer accounts, the menace actors deal with company cloud apps like an all-you-can-eat buffet.

Utilizing automated toolkits, they roam throughout native Microsoft 365 functions, performing every thing from information theft to monetary fraud and extra.

For instance, via “My Signins,” they are going to manipulate the sufferer’s multi-factor authentication (MFA) settings, registering their very own authenticator app or telephone quantity for receiving verification codes.

In addition they carry out lateral motion in organizations through Trade On-line, sending out extremely personalised messages to specifically focused people, significantly staff of human sources and finance departments who take pleasure in entry to personnel data or monetary sources. They’ve additionally been noticed exfiltrating delicate company information from Trade (amongst different sources inside 365) and creating devoted guidelines geared toward erasing all proof of their exercise from victims’ mailboxes.

To defend towards these potential outcomes, Proofpoint recommends that organizations pay shut consideration to potential preliminary entry makes an attempt and account takeovers – significantly a Linux user-agent that the researchers have recognized as an indicator of compromise (IoC). Organizations also needs to implement strict password hygiene for all company cloud customers and make use of auto-remediation insurance policies to restrict any potential harm in a profitable compromise.

Source link

Contents
Company Cloud CompromiseClouds Collect: Cyber Fallout for Organizations
TAGGED: Azure, Campaign, DCN, execs, hacking, ongoing, Senior, targets
Share This Article
Twitter Email Copy Link Print
Previous Article ASML ASML Shows Off $380M, 165-Ton Machine Behind AI Shift | DCN
Next Article AI research UK AI research hub ‘APRIL’ to deliver next-generation technology
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Exploring AI in the APAC retail sector

AI within the APAC retail sector is transitioning from analytics and pilots into workflows and…

February 20, 2026

Perplexity just made AI research crazy cheap—what that means for the industry

Be a part of our every day and weekly newsletters for the most recent updates…

February 15, 2025

Best cross-tenant migration tool: Securing enterprise cloud transitions

Cross-tenant migration is commonly perceived as a purely technical process. In actuality, it is among…

January 21, 2026

Liquid Edge AI Platform LEAP lets devs build local AI mobile apps

Need smarter insights in your inbox? Join our weekly newsletters to get solely what issues…

July 21, 2025

Dycom Buys Power Solutions to Deepen Data Center Capabilities

Dycom Industries is transferring to deepen its position within the fast-expanding information middle build-out with…

November 30, 2025

You Might Also Like

Premio targets multi-camera edge AI with new Jetson Orin systems
Edge Computing

Premio targets multi-camera edge AI with new Jetson Orin systems

By saad
Uber expands use of AWS chips for AI workloads
Cloud Computing

Uber expands use of AWS chips for AI workloads

By saad
Tanium introduces autonomy driven by AI and security innovation
Cloud Computing

Tanium introduces autonomy driven by AI and security innovation

By saad
Why Google is building more data centres in Asia
Cloud Computing

Why Google is building more data centres in Asia

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.