• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft warns of widescale credential stealing attacks by russian hackers

Microsoft Warns of Widescale Credential Stealing Attacks by Russian Hackers

You are here: Home / General Cyber Security News / Microsoft Warns of Widescale Credential Stealing Attacks by Russian Hackers
June 26, 2023

Microsoft has disclosed that it can be detected a spike in credential-stealing attacks executed by the Russian state-affiliated hacker group recognized as Midnight Blizzard.

The intrusions, which built use of residential proxy providers to obfuscate the source IP tackle of the attacks, goal governments, IT company vendors, NGOs, defense, and critical producing sectors, the tech giant’s menace intelligence crew said.

Midnight Blizzard, previously known as Nobelium, is also tracked under the monikers APT29, Cozy Bear, Iron Hemlock, and The Dukes.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The team, which drew around the globe awareness for the SolarWinds source chain compromise in December 2020, has ongoing to count on unseen tooling in its focused attacks aimed at foreign ministries and diplomatic entities.

It is really a indication of how identified they are to preserve their operations up and functioning irrespective of currently being exposed, which would make them a especially formidable actor in the espionage spot.

Cybersecurity

“These credential attacks use a wide range of password spray, brute-force, and token theft approaches,” Microsoft explained in a collection of tweets, incorporating the actor “also done session replay attacks to obtain first entry to cloud means leveraging stolen periods possible obtained by using illicit sale.”

The tech huge additional known as out APT29 for its use of household proxy companies to route malicious traffic in an attempt to obfuscate connections made using compromised credentials.

“The threat actor most likely applied these IP addresses for pretty small periods, which could make scoping and remediation tough,” the Windows makers claimed.

The enhancement comes as Recorded Upcoming comprehensive a new spear-phishing marketing campaign orchestrated by APT28 (aka BlueDelta, Forest Blizzard, FROZENLAKE, Iron Twilight, and Extravagant Bear) concentrating on government and army entities in Ukraine due to the fact November 2021.

The attacks leveraged email messages bearing attachments exploiting numerous vulnerabilities in the open up-resource Roundcube webmail application (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to carry out reconnaissance and facts accumulating.

Microsoft

A productive breach enabled the Russian military services intelligence hackers to deploy rogue JavaScript malware that redirected the incoming email messages of targeted men and women to an email address less than the attackers’ manage as very well as steal their get in touch with lists.

“The campaign displayed a large degree of preparedness, rapidly weaponizing news content material into lures to exploit recipients,” the cybersecurity corporation reported. “The spear-phishing email messages contained information themes linked to Ukraine, with matter traces and written content mirroring authentic media sources.”

Cybersecurity

Additional importantly, the exercise is reported to dovetail with one more set of attacks weaponizing a then-zero-working day flaw in Microsoft Outlook (CVE-2023-23397) that Microsoft disclosed as utilized in “restricted specific attacks” towards European companies.

The privilege escalation vulnerability was addressed as part of Patch Tuesday updates rolled out in March 2023.

The findings display Russian danger actors’ persistent endeavours in harvesting beneficial intelligence on numerous entities in Ukraine and across Europe, particularly pursuing the entire-scale invasion of the place in February 2022.

The cyberwarfare operations aimed at Ukrainian targets have been notably marked by the popular deployment of wiper malware made to delete and destroy information, turning it into a single of the earliest occasions of significant-scale hybrid conflict.

“BlueDelta will virtually definitely proceed to prioritize focusing on Ukrainian authorities and non-public sector companies to assist broader Russian army attempts,” Recorded Long run concluded.

Observed this short article appealing? Comply with us on Twitter  and LinkedIn to read through a lot more exceptional content we article.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «chinese hackers using never before seen tactics for critical infrastructure attacks Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks
Next Post: How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To Prevent Other Key AI Risks in SaaS how generative ai can dupe saas authentication protocols — and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.