Site icon TheCyberThrone

Microsoft Azure Environment targeted by malicious campaign

Advertisements

Proofpoint has observed a new malicious campaign targeting dozens of Microsoft Azure environments.

The campaign started in November 2023 and is still active, Proofpoint warned in a security advisory published February 12, 2024

Threat actors have targeted hundreds of individuals with multiple operational and executive roles across different organizations. The threat actors send their victims to spear phishing lures that include shared documents.

Advertisements

Once the victim clicks on the malicious link, which installs a payload, the threat actors use a specific Linux user-agent to access a range of their victims’ native Microsoft365 apps as well as their ‘OfficeHome’ sign-in application.

After gaining access to these applications, they conduct a series of post-compromise activities, including the following:

They also create dedicated obfuscation rules in the victim’s mailbox to cover their tracks and erase all evidence of malicious activity.

Advertisements

Proofpoint shared a list of recommendations to prevent and mitigate this campaign. These include:

Exit mobile version