- Microsoft researchers warn Storm‑2949 is abusing the Self‑Service Password Reset circulation to hijack accounts
- Attackers trick victims into approving MFA prompts through telephone calls, then reset passwords and exfiltrate delicate knowledge
- The marketing campaign targets Microsoft 365 and Azure environments, with Microsoft urging tighter RBAC controls and monitoring of excessive‑danger operations
A hacking group often known as Storm-2949 is abusing the password reset characteristic in Microsoft’s companies to steal folks’s login credentials, entry their accounts, and exfiltrate as a lot delicate knowledge as doable.
A brand new report revealed by the Microsoft Defender Safety Analysis Staff claims that on the coronary heart of this marketing campaign is the Self-Service Password Reset (SSPR) circulation discovered within the Microsoft ecosystem.
Often, when an worker forgets their credentials and clicks the “Forgot my password” button, Microsoft sends an MFA immediate to their registered secondary gadget. When the worker approves it, they’re allowed to set a brand new password by way of the identical gadget the method was initiated at first.
Learn how to defend
Storm-2949 was abusing it in extremely focused assaults. First, they might establish their goal, acquire their telephone quantity, in addition to the e-mail used to log into Microsoft’s companies. Then, they might provoke the password reset circulation and concurrently name the victims on the telephone.
They might introduce themselves as IT technicians and would persuade the victims into approving the MFA immediate, successfully being allowed to create a brand new password.
The subsequent step is to push the sufferer out of the account and exfiltrate as a lot info as doable.
The Microsoft Risk Intelligence crew described the marketing campaign as “methodical, refined, and multi-layered” concentrating on Microsoft 365 purposes, file-hosting companies, and Azure-hosted manufacturing environments.
“In a single occasion, Storm-2949 used the OneDrive net interface to obtain hundreds of information in a single motion to their very own infrastructure,” Microsoft stated. “This sample of information theft was repeated throughout all compromised consumer accounts, possible as a result of totally different identities had entry to totally different folders and shared directories.”
To defend towards this marketing campaign, Microsoft suggests customers restrict Azure RBAC permissions, retain Azure Key Vault logs for a 12 months, scale back entry to Key Vault, and limit public entry to Key Vaults. It additionally advises utilizing knowledge safety choices in Azure Storage, and monitoring for high-risk Azure administration operations.

The most effective antivirus for all budgets
Observe TechRadar on Google Information and add us as a most well-liked supply to get our knowledgeable information, evaluations, and opinion in your feeds.

