Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Openai and human researchers condemn “reckless” safety culture at Elon Musk’s Xai

GM teams up with Redwood Materials to power data center with EV batteries

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russia-related hackers hijacking accounts using “device code phishing”
Identity

Russia-related hackers hijacking accounts using “device code phishing”

userBy userFebruary 14, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 14, 2025Ravi LakshmananEnterprise Security/Cyber ​​Attacks

Device code phishing

Since August 2024, Microsoft has been paying attention to an emerging threat cluster called Storm-2372, which is attributed to a new set of cyberattacks targeting various sectors.

The attacks target the governments in Europe, North America, Africa and the Middle Ages, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, higher education, and energy/oil and gas sectors. east.

It has been observed that moderately confidently assessed threat actors to align with Russian interests, victims and commerce are targeted to users through messaging apps such as WhatsApp, Signal, and Microsoft teams. It’s there. I’ll try to build trust.

Cybersecurity

“Attacks use a specific phishing technique called “device code phishing” to trick users into logging in to productivity apps, and logins that Storm-2372 actors can use to access compromised accounts. Captures information from (tokens),” Microsoft Threat Intelligence said in a new report.

The goal is to leverage authentication codes obtained through methods to access the target account, misuse that access to keep sensitive data as long as the token is valid and persistent to the victim environment. It is to enable access to the site.

The tech giant sends a phishing email that pretends to be a Microsoft team that meets an invitation to authenticate message recipients using device code generated by threat actors when clicked It said it includes that. token.

Device code phishing

“During an attack, the threat actor generates legitimate device code requests and tricks the target into entering it on a legitimate sign-in page,” explained Microsoft. “This gives actor access, allows them to capture generated authentications (access and updates), and use those tokens to access the target’s accounts and data.”

You can use the Fish Authentication Token to access other services that users already have permission, such as email and cloud storage, without the need for a password.

Cybersecurity

Microsoft said that a valid session is used to move horizontally within the network by sending similar phishing to other users from a compromised account. Additionally, Microsoft Graph Service is used to search for messages for violated accounts.

“Threat actors were using keyword searches to display messages containing words such as username, password, administrator, TeamViewer, AnyDesk, credentials, secrets, ministries, and Gov,” Redmond said. , added emails that match these filter criteria. A threat actor.

To mitigate the risks posed by such attacks, organizations should block device code flows wherever possible, enable phishing-resistant multi-factor authentication (MFA) and follow the principle of minimal privilege. I recommend it.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRansomhub will become the top ransomware group in 2024, launching over 600 organizations worldwide
Next Article VisitBritain explores the future of event bidding at association meetings in ICC Wales
user
  • Website

Related Posts

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

July 16, 2025

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

July 16, 2025

Fully patched Sonic Wall SMA 100 Series Device with UNC6148 Backdoor of Step Rootkit

July 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Openai and human researchers condemn “reckless” safety culture at Elon Musk’s Xai

GM teams up with Redwood Materials to power data center with EV batteries

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

GMC Hummer Ev surpassed Tesla Cybertruck’s last quarter

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.