For the first time in the history of Microsoft, a cyberattack has left hundreds of executive accounts compromised and caused a major user data leak as Microsoft Azure was attacked.

According to Proofpoint, the hackers use the malicious techniques that were discovered in November 2023. It includes credential theft through phishing methods and cloud account takeover (CTO) which helped the hackers gain access to both Microsoft365 applications as well as OfficeHome.

  • echo64@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    Azure products ask you for your identity and signin a lot. Honestly, I’m asked to log in again at least once every 24 hours. That’s assuming I don’t traverse some sort of service wall where I’m now in a different system after clicking a link.

    I do cloud engineering for a living, and I would probably fall for at least some phishing things around Azure, specifically because azure identity management is so obtuse and constantly asking for things.

    It’s absolutely on the system that Microsoft designed , and the practices they encourage, and the mitagations that apparently don’t exist.

    • Sunforged@lemmy.ml
      link
      fedilink
      arrow-up
      0
      arrow-down
      1
      ·
      8 months ago

      Thank you. Security verification has become so cumbersome that people just try to push through without thinking.