Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Storm-1977 uses Azurechecker to hit the education cloud and deploy over 200 crypto mining vessels
Identity

Storm-1977 uses Azurechecker to hit the education cloud and deploy over 200 crypto mining vessels

userBy userApril 27, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 27, 2025Ravi LakshmananKubernetes / Cloud Security

Azurechecker clouds

Microsoft has revealed that Storm-1977 has been carrying out password spray attacks on cloud tenants over the past year, so that threat actors it tracks will track them.

“Attacks include using Azurechecker.exe, a command line interface (CLI) tool used by a wide range of threat actors,” the Microsoft Threat Intelligence team said in an analysis.

Tech Giant noted that “we observed a binary connecting to an external server named sac-auth.nodefunction.[.]VIP “Get AES encrypted data containing a list of password spray targets.

The tool accepts as input a text file called “accounts.txt” containing the username and password combination used to perform a password spray attack.

“The threat actors then used the information from both files and posted their credentials to the target tenant for verification,” Microsoft said.

Cybersecurity

In one successful instance of the account compromise Redmond observed, the threat actor is said to have used guest accounts to create resource groups within the compromised subscription.

The attackers then created over 200 containers within the resource group, with the ultimate goal of carrying out illegal cryptocurrency mining.

Microsoft said containerized assets such as Kubernetes clusters, container registries and images are responsible for various types of attacks, including usage.

Breaked cloud credentials promote cluster takeover container images with vulnerabilities and misconceptions to perform malicious actions, run mismanagement interfaces, access Kubernetes APIs, hijack entire cluster nodes running with vulnerable code or software, deploy or hijack malicious containers.

To mitigate such malicious activity, organizations recommend ensuring container deployment and runtime, monitoring anomalous Kubernetes API requests, configuring policies to prevent deployment from untrusted registry, and verifying that images deployed in containers are free from vulnerabilities.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBarcelona Edge Real Madrid in extra time to win the Copa del Rey | Football News
Next Article Republican states double school vouchers as costs rise
user
  • Website

Related Posts

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Harvard International Students: What the Judge’s Judgment Means

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Elon Musk’s AI startup Xai will increase bond yields to 12.5% ​​with a $5 billion debt hike due to weak investor demand

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.