ETFOptimize | High-performance ETF-based Investment Strategies

Quantitative strategies, Wall Street-caliber research, and insightful market analysis since 1998.


ETFOptimize | HOME
Close Window

Geeky News Highlights Midnight Blizzard's Latest Attacks Targeting Microsoft Teams Users

By: IssueWire

The APT Group meticulously orchestrated social engineering attacks employing sophisticated credential theft phishing tactics to bypass the Multi-Factor Authentication (MFA) protection of numerous organisations

Surrey, United Kingdom Aug 24, 2023 (Issuewire.com) - Geeky News, a technology and lifestyle journal, has unveiled a disconcerting cybersecurity revelation that underscores the escalating sophistication of digital threats. In an article titled "Microsoft Teams Targeted by Midnight Blizzard APT Group," the journal sheds light on the alarming tactics employed by an Advanced Persistent Threat (APT) group known as Midnight Blizzard. The group has leveraged Microsoft Teams as a vector for targeted phishing attacks.

Microsoft Threat Intelligence has brought to light this unsettling development, revealing that the APT group orchestrated meticulously planned social engineering attacks. By employing intricate credential theft and phishing tactics, the attackers managed to circumvent Multi-Factor Authentication (MFA) protections, thus penetrating the defences of numerous organisations. The report attributes these attacks to the Russian Midnight Blizzard threat actor, a group previously recognised as Nobelium.

The APT group's tactics were quite sophisticated. They exploited Microsoft 365 tenants owned by small businesses that had been compromised in advance. This modus operandi involved renaming the compromised tenant and introducing a new onmicrosoft.com subdomain, all while creating a new user linked to the domain. These fake tenants and subdomains frequently included security or product-related terms, such as "teamsprotection," "azuresecuritycenter," or "teamsprotection," lending an air of authenticity to their operations.

The attackers initiated their campaign by ingeniously sending Microsoft Teams message requests to targeted company staff members. Once accepted, the recipients would then receive subsequent Teams messages with instructions to input a code into Microsoft Authenticator on their mobile devices. This seemingly innocuous action inadvertently granted the attackers access tokens, providing unauthorised entry into the target user's Microsoft 365 account.

Upon successful breach, the attackers proceeded with post-compromise activities, often involving the pilfering of sensitive data from compromised Microsoft 365 accounts. In some instances, the hackers even ventured to introduce unauthorised devices into organisations, disguising them as managed entities through Microsoft Entra ID, potentially sidestepping access restrictions.

Microsoft reacted swiftly by initiating an investigation into the methods employed by the attackers to compromise legitimate Azure tenants. The software giant has taken proactive steps to dismantle the malicious subdomains used by the threat actors and mitigate the ongoing impact of the campaign. However, the scale of the damage is deeply concerning. Microsoft's comprehensive investigation has revealed that around 40 global organisations have fallen victim to this orchestrated campaign.

The victims of this cyber onslaught span a wide range of sectors, including government agencies, non-government organisations (NGOs), technology firms, IT services, media businesses, and discrete manufacturing companies. Notably, these organisations are primarily based in the US and Europe, highlighting the global reach of this insidious cyberattack.

The campaign's sophistication has left cybersecurity experts astounded, further underscoring the urgency of strengthening defences. The attackers' utilisation of legitimate Microsoft domains as part of their strategy makes it exceedingly difficult for users to identify the deceptive nature of their prompts.

In response to this incident, Microsoft urges organisations prioritising training employees to recognise the dangers posed by social engineering and credential phishing attacks. For enhanced security awareness and an elevated cybersecurity posture, organisations can consider specialised cybersecurity training programs, such as those offered by CultureAI.

Whilst employee training is a pivotal element, Microsoft also advises organisations to enhance their cybersecurity posture. This can be done by deploying phishing-resistant authentication methods and reinforcing the strength of conditional access authentication for mission-critical applications, thereby embracing a multi-faceted approach to security.

To read the full article, please visit: https://www.geekynews.co.uk/microsoft-teams-targeted-by-midnight-blizzard/

Media Contact

Geeky News


press@geekynews.co.uk

+44 20 3800 1212

Parallel House, 32 London RoadGuildford,Surrey

https://www.geekynews.co.uk/

Source :Geeky News

This article was originally published by IssueWire. Read the original article here.

Recent Quotes

View More
Symbol Price Change (%)
AMZN  238.18
+1.53 (0.65%)
AAPL  258.21
-1.75 (-0.67%)
AMD  227.92
+4.32 (1.93%)
BAC  52.59
+0.11 (0.21%)
GOOG  333.16
-3.15 (-0.94%)
META  620.80
+5.28 (0.86%)
MSFT  456.66
-2.72 (-0.59%)
NVDA  187.05
+3.91 (2.13%)
ORCL  189.85
-3.76 (-1.94%)
TSLA  438.57
-0.63 (-0.14%)
Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the Privacy Policy and Terms Of Service.


 

IntelligentValue Home
Close Window

DISCLAIMER

All content herein is issued solely for informational purposes and is not to be construed as an offer to sell or the solicitation of an offer to buy, nor should it be interpreted as a recommendation to buy, hold or sell (short or otherwise) any security.  All opinions, analyses, and information included herein are based on sources believed to be reliable, but no representation or warranty of any kind, expressed or implied, is made including but not limited to any representation or warranty concerning accuracy, completeness, correctness, timeliness or appropriateness. We undertake no obligation to update such opinions, analysis or information. You should independently verify all information contained on this website. Some information is based on analysis of past performance or hypothetical performance results, which have inherent limitations. We make no representation that any particular equity or strategy will or is likely to achieve profits or losses similar to those shown. Shareholders, employees, writers, contractors, and affiliates associated with ETFOptimize.com may have ownership positions in the securities that are mentioned. If you are not sure if ETFs, algorithmic investing, or a particular investment is right for you, you are urged to consult with a Registered Investment Advisor (RIA). Neither this website nor anyone associated with producing its content are Registered Investment Advisors, and no attempt is made herein to substitute for personalized, professional investment advice. Neither ETFOptimize.com, Global Alpha Investments, Inc., nor its employees, service providers, associates, or affiliates are responsible for any investment losses you may incur as a result of using the information provided herein. Remember that past investment returns may not be indicative of future returns.

Copyright © 1998-2017 ETFOptimize.com, a publication of Optimized Investments, Inc. All rights reserved.