Ongoing Microsoft Azure Account Hijacking Campaign Targets Executives
Summary: Analyst Comments: https://www.bleepingcomputer.com/ne...ccount-hijacking-campaign-targets-executives/
Proofpoint has disclosed details of a phishing campaign that it detected in late November 2023 which has compromised hundreds of user accounts in dozens of Microsoft Azure environments. In particular, the campaign has singled out employees who are likely to hold higher privileges, such as senior executives at organizations. According to researchers, the attacks initiate, with the attacks sending targets a document containing an embedded link masquerading as a “view document” button. When clicked, it will redirect the victim to a phishing site designed to steal credentials and other information.
Using these details, the actors have gained unauthorized access to the following Microsoft 365 components:
Based on the use of certain local fixed-line internet service providers, the actors are likely based in Russia or Nigeria. Taking a look at the infrastructure used by these actors, researchers uncovered various proxies, data hosting services, and hijacked domains.
Proofpoint notes that the actors are using the following Linux user-agent string when accessing Microsoft365 applications:
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Typically when sending a request to a web application certain details are sent to the server which includes the user-agent string. This string provides information on the browser and system being used to make that request. In this case, the actors are spoofing their user-agent string as a way to avoid detection.
Suggested Corrections: