Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Storm-0501 exploits Entra ID to remove and delete Azure data in hybrid cloud attacks
Identity

Storm-0501 exploits Entra ID to remove and delete Azure data in hybrid cloud attacks

userBy userAugust 27, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A financially motivated threat actor known as Storm-0501 has been observed to improve tactics for carrying out data delamination and tor attacks targeting cloud environments.

“Unlike traditional on-premises ransomware, threat actors usually deploy malware to encrypt critical files across endpoints within the compromised network and negotiate with decryption keys. Cloud-based ransomware brings about fundamental changes.”

“Learning on cloud-native capabilities, Storm-0501 rapidly removes large amounts of data, destroys data and backups within the victim environment, and demands ransom.

Storm-0501 was first documented by Microsoft almost a year ago and details hybrid cloud ransomware attacks targeting the US government, manufacturing, transportation, and law enforcement sectors, with on-premises to cloud threat targets pivoting into the cloud for subsequent data removal, qualification theft, and ransomware deployment.

Raised as active since 2021, hacking groups have evolved into Ransomware as a Service (RAAS) affiliate marketing over the years, including Sabbath, Hive, Black Cat (Alphv), Hunter International, Rockbit and Empargo.

Cybersecurity

“The Storm-0501 continues to demonstrate proficiency in moving between on-premises and cloud environments, exemplifying how threat actors adapt as hybrid cloud adoption grows,” the company said. “They look for security gaps with devices that are not managed in hybrid cloud environments, avoid detection, escalate cloud privileges, and in some cases cross tenants with multi-tenant setups to achieve their goals.”

A typical attack chain involves on-premises lateral movement and reconnaissance steps that allow initial access to achieve privilege escalation to domain administrators, followed by on-premises lateral movement and reconnaissance steps that allow attackers to violate the target cloud environment and initiate a multi-stage sequence that includes persistence, capacity escalation, data, ejection, and absorption.

Initial access per Microsoft is achieved through intrusions facilitated by access brokers such as Storm-0249 and Storm-0900, which can use stolen, compromised credentials to sign in to the target system, or exploit various known code execution vulnerabilities.

In a recent campaign targeting unnamed large companies with multiple subsidiaries, Storm-0501 reportedly conducted reconnaissance before moving the network laterally using Evil-WinRM. The attacker also extracted the credentials from Active Directory by performing what is called a DCSYNC attack to simulate the behavior of the domain controller.

“We leveraged scaffolding in an active directory environment to traverse between Active Directory domains and eventually move laterally, breaching a second Entra Connect server associated with a different ENTRA ID tenant and an Active Directory domain,” Microsoft said.

“The threat actors repeated the reconnaissance process by extracting the directory sync account. This time they targeted the identity and resources of the second tenant.”

These efforts ultimately result in Storm-0501 identifying the global administrator role and non-human synchronized identity in its tenant’s Microsoft Entra ID, lacking multifactorial authentication (MFA) protection. This opened the door to a scenario where an attacker resets a user’s on-premises password and syncs it to that user’s cloud ID using the ENTRA Connect Sync service.

A digital intruder armed with compromised global management accounts will access the Azure portal, register the threat actor-owned Entra Identity Tenants as a trusted federation domain, create a backdoor, and then increase access to critical Azure resources before setting up a data delamination and extension phase.

Identity Security Risk Assessment

“After completing the Exftration phase, Storm-0501 began demassing Azure resources containing victim organization data, ensuring that victims do not take any improvements or mitigation measures by restoring the data,” Microsoft said.

“After excluding and destroying data in your Azure environment, the threat actor began the Fear Tor stage, using one of the previously compromised users to contact the victim using a Microsoft team and requesting ransom.”

The company said it has enacted a change to its Microsoft Entra ID. He said this prevents threat actors from escalating privileges by abusing directory sync accounts. We also released an update for Microsoft Entra Connect (version 2.5.3.0) to support the latest authentication, allowing customers to configure application-based authentication for enhanced security.

“It is also important to enable Trusted Platform Modules (TPMs) on Entra Connect Sync Server to securely store sensitive credentials and encryption keys, and to mitigate the Storm-0501 certification extraction technology,” added Tech Giant.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleJudge deny Meta’s request to dismiss sexual harassment lawsuits filed by early employees
Next Article Treating periodontal disease may protect your arteries, research finds
user
  • Website

Related Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025

Over 100 VS Code extensions expose developers to hidden supply chain risks

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Group chats added to Threads as Messaging rolls out to the EU

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.