Ransomware gang using stolen Microsoft Entra ID creds to bust into the cloud

Ransomware gang using stolen Microsoft Entra ID creds to bust into the cloud

September 27, 2024 at 09:44AM

Microsoft issued a warning about Storm-0501’s shift in tactics, targeting hybrid cloud environments. Despite being a relatively new group, Storm-0501 is prolific in carrying out ransomware attacks and has been linked to various ransomware affiliate programs. The group typically targets over-privileged accounts, and Microsoft has provided threat-hunting tips and indicators of compromise.

Based on the meeting notes provided, it is evident that Microsoft’s latest threat intelligence blog has highlighted Storm-0501’s sophisticated techniques in targeting and backdooring hybrid cloud environments. Storm-0501 has been actively involved in carrying out ransomware attacks and is affiliated with several ransomware programs.

Moreover, recent attacks have raised concerns as the group has leveraged stolen credentials to pivot from on-prem to the cloud environment and has compromised Entra Connect Sync accounts, which presents a high risk to the target.

Additionally, Storm-0501 has successfully pivoted into the cloud by targeting unsecured on-prem Domain Admin accounts and has shown a tendency to implant backdoors for persistent access. Although the group has been deploying Embargo’s ransomware payload, not all attacks lead to ransomware deployment.

The meeting notes also reference other news, such as a complaint filed by Google against Microsoft with the European Commission, the progress of Microsoft’s Secure Future Initiative, concerns raised by administrators using Windows Server Update Services, and an Azure outage caused by a major ISP’s settings error.

In summary, the meeting notes provide a detailed overview of Storm-0501’s tactics, Microsoft’s response, and other relevant industry news.

Full Article