Microsoft warns of credential theft attack
According to researchers, the hacker group used residential proxy services to obfuscate the source IP addresses of attacks targeting governments, IT service providers, NGOs, defense and important manufacturing sectors.
Midnight Blizzard was previously known as Nobelium, APT29, Cozy Bear, Iron Hemlock. This group attracted worldwide attention after attacking the SolarWinds supply chain in December 2020, as well as carrying out attacks. Intentional attacks targeting foreign ministries and diplomatic organizations.
"These credential attacks use a variety of password theft, brute-force, and token theft techniques," Microsoft said in a series of tweets.
'The threat actor may have used these IP addresses for very short periods of time, which makes scoping and remediation difficult,' Microsoft said.
Recently, cybersecurity company Recorded Future also revealed a new online phishing campaign orchestrated by APT28 (also known as BlueDelta, Forest Blizzard, FROZENLAKE, Iron Twilight and Fancy Bear) targeting major organizations. government and military in Ukraine since November 2021.
The attacks leveraged emails with attachments exploiting multiple vulnerabilities in the open source Roundcube webmail software (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to conduct reconnaissance and data collection.
The cyber security firm said: 'The campaign demonstrated a high level of preparation, quickly weaponizing news content into bait to exploit recipients.'
More importantly, this activity is said to be consistent with a series of attacks exploiting a zero-day vulnerability in Microsoft Outlook (CVE-2023-23397) against European organizations.
The privilege escalation vulnerability is currently fixed in the Patch Tuesday patch released in March 2023.
You should read it
- Instructions for creating the fastest Microsoft account
- Microsoft Office is now Microsoft 365. Here's how you could get it for free
- Microsoft will also have smart watches
- How to Become a Microsoft MVP
- 11 best tips to get started with Microsoft Loop
- Link Download Microsoft Word 2019
- Link download Microsoft Teams 1.3.00.3564
- 15 interesting features to use in Microsoft 365
May be interested
- What is 51% attack? How does 51% attack work?the 51% attack refers to a potential attack on the integrity of the blockchain system, in which a single malicious actor or organization tries to control more than half of the network's total hash power, .
- Activate the features immediately after buying the device to avoid iPhone theft- the stories of iphone theft must be no stranger to you. in this article, let's tipsmake give effective anti-theft measures with iphone.
- Why can't this built-in Credential Manager feature in Windows replace a password manager?windows has a built-in credential manager, but it's not what you think it is—and certainly not a replacement for a password manager.
- 7 best anti-theft apps to protect Android devicenobody wants to imagine their phone being stolen, but the truth is that it can happen to anyone. therefore, it is always a good idea to have some anti-theft applications on the device.
- Microsoft warns of phishing campaigns targeting Outlook Web App and Office 365 usersmicrosoft security experts issue an important warning about an ongoing large-scale phishing, targeting outlook web app (owa) services and office 365.
- Do you know how to prevent website theft?the issue of website content theft is becoming more serious. many business bloggers have encountered this problem for some time. sometimes, the content has changed a bit, sometimes a 'copy and paste' version. this is a painful problem for many people, so the following article will guide you how to 'anti-theft'.
- 5 types of data theft you should know to preventthe truth is that data security is a complex and difficult issue. if you think your data is completely safe, there may be holes that you don't know. that is why it is important to know how data is stolen from a computer or network device for appropriate responses.
- Summary of Dude Theft Wars cheat codes and how to enter Dude Theft Wars cheatsif you are a gta game lover, don't miss dude theft wars. let's explore the giftcode set of this game with tipsmake.com immediately.
- Bad guys can steal data by freezing RAM sticks with liquid nitrogenwith the cold boot attack technique, one can separate data from a ram bar after it is turned off.
- The Microsoft MSERT tool can find web shells related to the Exchange Server attack campaignmicrosoft has just released a new update to msert, which comes with the ability to detect web shells deployed in recent exchange server attacks.