DailyPost 2701

Every cyberattack gives you a feeling it can’t get bigger, by whatever parameters you have in mind, but every single time that barrier is breached. The parameters can be nature of access, ransomware parameters, the brand of the business enterprise, geographical spread, not of computers / servers engaged, cloud etc. This is not a parameters exhaustive list, it can be termed indicative at its best. The world has moved on the cloud and quite rightly so. The cloud providers are presumed to be most secure and that is used as an argument to garner customers.

That single organizations; small and big would not be able provide the nature of services and security, which only global cloud service providers can. This has been the genesis of cloud service providers. Cloud broke every glass ceiling during Covid-19, has now consolidated its position even further. But if the world’s second largest cloud service provider gets hacked, you will certainly be at your wit’s end. That is precisely what has happened. Microsoft Azure suffers the biggest security breach in its history. We are living in technologically paradoxical times, a world of tech facilitation to the level tech metamorphosis, but on the other hand, the* intense hacking capabilities of the cyber world is ripping apart* some of its gains.

Critical user data of Microsoft’s Azure seems to have been compromised in a recent security breach. Cyber-attacks have become This attack was operated on the top executives of big companies. The attack was being operated in multiple environments. Proofpoint, cyber security said that this hacking used the same malicious campaign detected in 2023. The code integrates “credential theft through phishing methods and cloud account takeover.” The route opened through these hacks, helps attackers to gain access to OfficeHome and at, the same time to Microsoft 365 applications. As expected, the hackers use proxy services to hide /mask their true location. The links embedded in documents would redirect the users to phishing websites.

The hackers mainly targeted both the mid-level and senior employees. It has been observed that more former employees were targeted. In this type of attack, once the account is compromised, the cyber criminals deploy their own multifactor-authentication for prolonging their access. Most importantly, “the attackers remove all evidence of suspicious activity all evidence of suspicious activity to erase their tracks.” The objective of attack generally provides for the clues, here it seems to be data theft and financial fraud. The current evidence does not help identify the bad actors but it is believed to have their origins in Russia and Nigeria, “based on the use of local fixed-line ISPs in these regions.

Sanjay Sahay

Have a nice evening.

Leave a Comment

Your email address will not be published. Required fields are marked *

The reCAPTCHA verification period has expired. Please reload the page.

Scroll to Top