Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Xai and Grok apologise for “terrifying behaviour”

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Storm-1977 uses Azurechecker to hit the education cloud and deploy over 200 crypto mining vessels
Identity

Storm-1977 uses Azurechecker to hit the education cloud and deploy over 200 crypto mining vessels

userBy userApril 27, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 27, 2025Ravi LakshmananKubernetes / Cloud Security

Azurechecker clouds

Microsoft has revealed that Storm-1977 has been carrying out password spray attacks on cloud tenants over the past year, so that threat actors it tracks will track them.

“Attacks include using Azurechecker.exe, a command line interface (CLI) tool used by a wide range of threat actors,” the Microsoft Threat Intelligence team said in an analysis.

Tech Giant noted that “we observed a binary connecting to an external server named sac-auth.nodefunction.[.]VIP “Get AES encrypted data containing a list of password spray targets.

The tool accepts as input a text file called “accounts.txt” containing the username and password combination used to perform a password spray attack.

“The threat actors then used the information from both files and posted their credentials to the target tenant for verification,” Microsoft said.

Cybersecurity

In one successful instance of the account compromise Redmond observed, the threat actor is said to have used guest accounts to create resource groups within the compromised subscription.

The attackers then created over 200 containers within the resource group, with the ultimate goal of carrying out illegal cryptocurrency mining.

Microsoft said containerized assets such as Kubernetes clusters, container registries and images are responsible for various types of attacks, including usage.

Breaked cloud credentials promote cluster takeover container images with vulnerabilities and misconceptions to perform malicious actions, run mismanagement interfaces, access Kubernetes APIs, hijack entire cluster nodes running with vulnerable code or software, deploy or hijack malicious containers.

To mitigate such malicious activity, organizations recommend ensuring container deployment and runtime, monitoring anomalous Kubernetes API requests, configuring policies to prevent deployment from untrusted registry, and verifying that images deployed in containers are free from vulnerabilities.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBarcelona Edge Real Madrid in extra time to win the Copa del Rey | Football News
Next Article Republican states double school vouchers as costs rise
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Xai and Grok apologise for “terrifying behaviour”

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.