• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
storm 1977 hits education clouds with azurechecker, deploys 200+ crypto mining

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

You are here: Home / General Cyber Security News / Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers
April 27, 2025

Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the past year.

“The attack involves the use of AzureChecker.exe, a Command Line Interface (CLI) tool that is being used by a wide range of threat actors,” the Microsoft Threat Intelligence team said in an analysis.

The tech giant noted that it observed the binary to connect to an external server named “sac-auth.nodefunction[.]vip” to retrieve an AES-encrypted data that contains a list of password spray targets.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The tool also accepts as input a text file called “accounts.txt” that includes the username and password combinations to be used to carry out the password spray attack.

“The threat actor then used the information from both files and posted the credentials to the target tenants for validation,” Microsoft said.

Cybersecurity

In one successful instance of account compromise observed by Redmond, the threat actor is said to have taken advantage of a guest account to create a resource group within the compromised subscription.

The attackers then created more than 200 containers within the resource group with the ultimate goal of conducting illicit cryptocurrency mining.

Microsoft said containerized assets, such as Kubernetes clusters, container registries, and images, are liable to various kinds of attacks, including using –

  • Compromised cloud credentials to facilitate cluster takeover
  • Container images with vulnerabilities and misconfigurations to carry out malicious actions
  • Misconfigured management interfaces to gain access to the Kubernetes API and deploy malicious containers or hijack the entire cluster
  • Nodes that run on vulnerable code or software

To mitigate such malicious activities, organizations are advised to secure container deployment and runtime, monitor unusual Kubernetes API requests, configure policies to prevent containers from being deployed from untrusted registries and ensure that the images being deployed in containers are free from vulnerabilities.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «toymaker uses lagtoy to sell access to cactus ransomware gangs ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
Next Post: Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised hackers exploit critical craft cms flaws; hundreds of servers likely»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.