Microsoft Warns of Russian-Linked Hackers Using ‘Device Code Phishing’ to Compromise Accounts

February 14, 2025
Enterprise Security / Cyber Attack

Microsoft has highlighted a new threat group known as Storm-2372, linked to a series of cyberattacks that have targeted multiple sectors since August 2024. The attacks focus on government entities, NGOs, IT services, defense, telecommunications, healthcare, higher education, and the energy sector across Europe, North America, Africa, and the Middle East.

Evaluated with medium confidence to align with Russian interests, the threat actors utilize messaging platforms such as WhatsApp, Signal, and Microsoft Teams. They impersonate notable figures relevant to their targets to gain trust. The attacks employ a phishing method known as ‘device code phishing,’ which deceives users into logging into productivity applications, allowing the actors to capture the login tokens for malicious use.

Microsoft Warns of Russian-Linked Cyber Attack Group Utilizing ‘Device Code Phishing’ Tactics

February 14, 2025
Enterprise Security / Cyber Attack

Microsoft has issued an urgent advisory regarding a rising threat actor, designated as Storm-2372, which is reportedly linked to Russian cyber interests. Since August 2024, this group has launched a series of cyber attacks targeting a diverse array of sectors, including government institutions, non-governmental organizations, IT services, telecommunications, healthcare, higher education, and the energy sector across Europe, North America, Africa, and the Middle East.

The Storm-2372 group leverages messaging platforms such as WhatsApp, Signal, and Microsoft Teams to engage potential victims. By impersonating individuals of significance to their targets, these attackers aim to cultivate trust, thereby increasing the likelihood of successful phishing attempts. This method is particularly insidious; it employs a technique termed ‘device code phishing’ to lure users into logging into their productivity applications. During these interactions, the attackers capture the login tokens, allowing them unauthorized access to user accounts.

The intricacies of this attack reveal several potential tactics as outlined in the MITRE ATT&CK framework, particularly in the realm of initial access and credential access. The impersonation strategy used by Storm-2372 indicates a methodical approach to infiltrating secure environments, exemplifying the use of social engineering as a precursor to exploit vulnerabilities.

Given the extensive and varied landscape of sectors under threat, organizations must be vigilant about their cybersecurity posture. The group’s focus on diverse industries showcases their adaptability and suggests thorough reconnaissance efforts to identify and exploit specific vulnerabilities within each sector. The use of messaging apps as a vector for attacks highlights the evolution of cyber threats in favor of more personal communication channels, complicating traditional defensive measures that organizations may employ.

Business owners are advised to enhance their cybersecurity awareness and deploy comprehensive educational programs that emphasize the recognition of phishing attempts, particularly those that utilize social engineering techniques. Implementing robust Multi-Factor Authentication (MFA) protocols can significantly mitigate the risk associated with unauthorized access attempts stemming from these phishing efforts.

In an era where cybersecurity threats are increasingly sophisticated and widespread, organizations must foster a culture of proactive engagement around security practices. Understanding the methods employed by actors like Storm-2372 is essential for fortifying defenses against potential breaches, ensuring business continuity, and maintaining the integrity of sensitive information. Regularly reviewing security protocols and updating training resources will be critical in countering the evolving threat landscape.

Source link