Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Intestinal bacteria can cleanse the body of toxic PFAS chemicals

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russia-related hackers hijacking accounts using “device code phishing”
Identity

Russia-related hackers hijacking accounts using “device code phishing”

userBy userFebruary 14, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 14, 2025Ravi LakshmananEnterprise Security/Cyber ​​Attacks

Device code phishing

Since August 2024, Microsoft has been paying attention to an emerging threat cluster called Storm-2372, which is attributed to a new set of cyberattacks targeting various sectors.

The attacks target the governments in Europe, North America, Africa and the Middle Ages, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, higher education, and energy/oil and gas sectors. east.

It has been observed that moderately confidently assessed threat actors to align with Russian interests, victims and commerce are targeted to users through messaging apps such as WhatsApp, Signal, and Microsoft teams. It’s there. I’ll try to build trust.

Cybersecurity

“Attacks use a specific phishing technique called “device code phishing” to trick users into logging in to productivity apps, and logins that Storm-2372 actors can use to access compromised accounts. Captures information from (tokens),” Microsoft Threat Intelligence said in a new report.

The goal is to leverage authentication codes obtained through methods to access the target account, misuse that access to keep sensitive data as long as the token is valid and persistent to the victim environment. It is to enable access to the site.

The tech giant sends a phishing email that pretends to be a Microsoft team that meets an invitation to authenticate message recipients using device code generated by threat actors when clicked It said it includes that. token.

Device code phishing

“During an attack, the threat actor generates legitimate device code requests and tricks the target into entering it on a legitimate sign-in page,” explained Microsoft. “This gives actor access, allows them to capture generated authentications (access and updates), and use those tokens to access the target’s accounts and data.”

You can use the Fish Authentication Token to access other services that users already have permission, such as email and cloud storage, without the need for a password.

Cybersecurity

Microsoft said that a valid session is used to move horizontally within the network by sending similar phishing to other users from a compromised account. Additionally, Microsoft Graph Service is used to search for messages for violated accounts.

“Threat actors were using keyword searches to display messages containing words such as username, password, administrator, TeamViewer, AnyDesk, credentials, secrets, ministries, and Gov,” Redmond said. , added emails that match these filter criteria. A threat actor.

To mitigate the risks posed by such attacks, organizations should block device code flows wherever possible, enable phishing-resistant multi-factor authentication (MFA) and follow the principle of minimal privilege. I recommend it.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRansomhub will become the top ransomware group in 2024, launching over 600 organizations worldwide
Next Article VisitBritain explores the future of event bidding at association meetings in ICC Wales
user
  • Website

Related Posts

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

July 4, 2025

AI Agent may be leaking data – Watch this webinar and learn how to stop it

July 4, 2025

A critical sudo vulnerability allows local users to gain root access to Linux and affect major distributions

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Intestinal bacteria can cleanse the body of toxic PFAS chemicals

AI Agent may be leaking data – Watch this webinar and learn how to stop it

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.