Microsoft Self-Service Password Reset Abused in Azure Data Theft Attacks
5 Articles
5 Articles
The Microsoft Defender Security Research Team has just unveiled a cyber-espionage campaign attributed to an actor named Storm-2949. The attack, without malware or traditional off-site tools, has transformed within a few days a single Microsoft Entra ID identity compromised by social engineering into a complete compromise of a target organization's cloud pile (Microsoft 365, Azure [...] The post Storm-2949, the chain of attack without malware exp…
Hackers Abuse Microsoft Entra ID Accounts to Exfiltrate Microsoft 365 and Azure Data
A threat actor known as Storm-2949 has launched a sophisticated, multi-layered cloud attack campaign targeting Microsoft Entra ID accounts to steal sensitive data from Microsoft 365 and Azure environments. The campaign was recently uncovered and has raised serious concerns about how modern attackers can abuse legitimate cloud features to carry out large-scale data theft across organizations. What makes this attack stand out is that it did not re…
Microsoft Exposes Storm-2949 Azure And M365 Breach
Microsoft Threat Intelligence has disclosed details of a cyberattack carried out by a threat actor tracked as Storm-2949, which escalated from a targeted identity compromise into a large-scale breach of cloud infrastructure and sensitive enterprise systems. The campaign focused heavily on data theft from Microsoft 365 services, Azure-hosted production environments, and cloud storage resources, demonstrating how compromised identities can become …
How Storm-2949 turned a compromised identity into a cloud-wide breach
In this article Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Note: Affilia…
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium


