Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Researchers warn Sitecore exploit chain linking cache addiction and remote code execution

Meta Update Chatbot Rules Avoid inappropriate topics with teenagers

Henrik Fisker quietly defeated his nonprofit after his EV startup went bankrupt

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Amazon abuses APT29 watering campaign Abuses Microsoft device code authentication
Identity

Amazon abuses APT29 watering campaign Abuses Microsoft device code authentication

userBy userAugust 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 29, 2025Ravi LakshmananThreat Intelligence/Malware

On Friday, Amazon said it had flagged and confused what it described as an opportunistic waterhole campaign organized by the Russian-linked APT29 actor as part of its intelligence gathering efforts.

The campaign is “designed to use compromised websites to redirect visitors to malicious infrastructure, and trick users into approving attacker-controlled devices via Microsoft’s device code authentication flow,” said CJ Moses, Amazon’s Chief Information Security Officer.

APT29 is a name assigned to a country sponsored hacking group that has been tracked as Bluebravo, Cloked Ursa, Cozylarch, Cozy Bear, Earth Koshchei, Icecap, Midnight Blizzard, and The Dukes, and is a country-sponsored hacking group with ties to Russian Foreign Information Services (SVR).

Cybersecurity

Over the past few months, prolific threat actors have been linked to attacks that leverage malicious Remote Desktop Protocol (RDP) configuration files to target Ukrainian entities and remove sensitive data.

Since the beginning of the year, it has been observed that hostile groups will employ a variety of phishing methods, including device code phishing and device-participating phishing to gain unauthorized access to Microsoft 365 accounts.

Recently in June 2025, Google said it had observed a threat cluster that APT29 partnered with APT29 to weaponize Google account features called application-specific passwords to allow access to victims’ emails. The highly targeted campaign was attributed to UNC6293.

The latest activities identified by Amazon’s Threat Intelligence Team highlight threat actors’ continued efforts to harvest qualifications and collect intelligence of interest, while simultaneously reducing commerce.

“This opportunistic approach demonstrates the continuous evolution of APT29, expanding its operations and gaining a wider net in its intelligence gathering efforts,” Moses said.

The attack was injected with JavaScript, where APT29 compromised various legitimate websites and redirected around 10% of visitors to the actor control domain.[.]com, mimics its cloudflare verification page and gives the illusion of legitimacy.

Identity Security Risk Assessment

In reality, the ultimate goal of the campaign was to tempt victims to enter legitimate device codes generated by threat actors on the sign-in page, effectively allowing access to Microsoft accounts and data. This technique was detailed in February 2025 by both Microsoft and Volexity.

This activity is also worth noting that it incorporates a variety of evasion techniques, such as Base64 encoding to hide malicious code, setting cookies to prevent repeated redirects of the same visitors, and moving to new infrastructure when blocked.

“Our team continued to track and disrupt operations despite the actors’ attempts to migrate to new infrastructure, including moving from AWS to another cloud provider,” Moses said. “After the intervention, we observed that actors register additional domains such as cloudflare.redirectpartners.[.]com tried to lure the victim into the Microsoft Device Code authentication workflow. ”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBillionaire Ambani taps Google and meta for building the Indian AI backbone
Next Article Henrik Fisker quietly defeated his nonprofit after his EV startup went bankrupt
user
  • Website

Related Posts

Researchers warn Sitecore exploit chain linking cache addiction and remote code execution

August 29, 2025

Abandoned Sogou Zhuyin Update Server Hijacking, weaponized campaign in the Thai One Spy Campaign

August 29, 2025

Can your security stack see chatgpt? Why network visibility is important

August 29, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Researchers warn Sitecore exploit chain linking cache addiction and remote code execution

Meta Update Chatbot Rules Avoid inappropriate topics with teenagers

Henrik Fisker quietly defeated his nonprofit after his EV startup went bankrupt

Amazon abuses APT29 watering campaign Abuses Microsoft device code authentication

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.