Microsoft warns of credential theft attack
According to researchers, the hacker group used residential proxy services to obfuscate the source IP addresses of attacks targeting governments, IT service providers, NGOs, defense and important manufacturing sectors.
Midnight Blizzard was previously known as Nobelium, APT29, Cozy Bear, Iron Hemlock. This group attracted worldwide attention after attacking the SolarWinds supply chain in December 2020, as well as carrying out attacks. Intentional attacks targeting foreign ministries and diplomatic organizations.
"These credential attacks use a variety of password theft, brute-force, and token theft techniques," Microsoft said in a series of tweets.
'The threat actor may have used these IP addresses for very short periods of time, which makes scoping and remediation difficult,' Microsoft said.
Recently, cybersecurity company Recorded Future also revealed a new online phishing campaign orchestrated by APT28 (also known as BlueDelta, Forest Blizzard, FROZENLAKE, Iron Twilight and Fancy Bear) targeting major organizations. government and military in Ukraine since November 2021.
The attacks leveraged emails with attachments exploiting multiple vulnerabilities in the open source Roundcube webmail software (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to conduct reconnaissance and data collection.
The cyber security firm said: 'The campaign demonstrated a high level of preparation, quickly weaponizing news content into bait to exploit recipients.'
More importantly, this activity is said to be consistent with a series of attacks exploiting a zero-day vulnerability in Microsoft Outlook (CVE-2023-23397) against European organizations.
The privilege escalation vulnerability is currently fixed in the Patch Tuesday patch released in March 2023.
You should read it
- Instructions for creating the fastest Microsoft account
- Microsoft Office is now Microsoft 365. Here's how you could get it for free
- Microsoft will also have smart watches
- How to Become a Microsoft MVP
- 11 best tips to get started with Microsoft Loop
- Link Download Microsoft Word 2019
- Link download Microsoft Teams 1.3.00.3564
- 15 interesting features to use in Microsoft 365
May be interested
- Activate the features immediately after buying the device to avoid iPhone theft- the stories of iphone theft must be no stranger to you. in this article, let's tipsmake give effective anti-theft measures with iphone.
- 7 best anti-theft apps to protect Android devicenobody wants to imagine their phone being stolen, but the truth is that it can happen to anyone. therefore, it is always a good idea to have some anti-theft applications on the device.
- Microsoft warns of phishing campaigns targeting Outlook Web App and Office 365 usersmicrosoft security experts issue an important warning about an ongoing large-scale phishing, targeting outlook web app (owa) services and office 365.
- Do you know how to prevent website theft?the issue of website content theft is becoming more serious. many business bloggers have encountered this problem for some time. sometimes, the content has changed a bit, sometimes a 'copy and paste' version. this is a painful problem for many people, so the following article will guide you how to 'anti-theft'.
- 5 types of data theft you should know to preventthe truth is that data security is a complex and difficult issue. if you think your data is completely safe, there may be holes that you don't know. that is why it is important to know how data is stolen from a computer or network device for appropriate responses.
- Summary of Dude Theft Wars cheat codes and how to enter Dude Theft Wars cheatsif you are a gta game lover, don't miss dude theft wars. let's explore the giftcode set of this game with tipsmake.com immediately.
- Bad guys can steal data by freezing RAM sticks with liquid nitrogenwith the cold boot attack technique, one can separate data from a ram bar after it is turned off.
- The Microsoft MSERT tool can find web shells related to the Exchange Server attack campaignmicrosoft has just released a new update to msert, which comes with the ability to detect web shells deployed in recent exchange server attacks.
- Microsoft warns of RCE vulnerability in Windows diagnostic toolif you've ever contacted microsoft support to get windows or windows server issues resolved, you've probably been guided through the microsoft support diagnostic tool (msdt). ).
- What is a Replay Attack?a replay attack occurs when a cybercriminal eavesdroves a communication over a secure network, intercepts it, then delays or resends the content, to get the recipient to do what the hacker wants.