InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Storm-1977 uses Azurechecker to hit the education cloud and deploy over 200 crypto mining vessels
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Storm-1977 uses Azurechecker to hit the education cloud and deploy over 200 crypto mining vessels
Technology

Storm-1977 uses Azurechecker to hit the education cloud and deploy over 200 crypto mining vessels

April 27, 2025 2 Min Read
Share
Clouds with AzureChecker
SHARE

Microsoft has revealed that Storm-1977 has been carrying out password spray attacks on cloud tenants over the past year, so that threat actors it tracks will track them.

“Attacks include using Azurechecker.exe, a command line interface (CLI) tool used by a wide range of threat actors,” the Microsoft Threat Intelligence team said in an analysis.

Tech Giant observed the binary as it connects to an external server named “sac-auth.nodefunction(.)VIP” and noted that it retrieves AES encrypted data containing a list of password spray targets.

The tool accepts as input a text file called “accounts.txt” containing the username and password combination used to perform a password spray attack.

“The threat actors then used the information from both files and posted their credentials to the target tenant for verification,” Microsoft said.

In one successful instance of the account compromise Redmond observed, the threat actor is said to have used guest accounts to create resource groups within the compromised subscription.

The attackers then created over 200 containers within the resource group, with the ultimate goal of carrying out illegal cryptocurrency mining.

Microsoft said containerized assets such as Kubernetes clusters, container registries and images are responsible for various types of attacks, including usage.

  • Breaks cloud credentials to facilitate cluster takeover
  • Container images with vulnerabilities and misconceptions to perform malicious actions
  • Misunderstood management interface Access Kubernetes API to deploy malicious containers or hijack the entire cluster
  • Nodes that run in vulnerable code or software

To mitigate such malicious activity, organizations recommend ensuring container deployment and runtime, monitoring anomalous Kubernetes API requests, configuring policies to prevent deployment from untrusted registry, and verifying that images deployed in containers are free from vulnerabilities.

See also  CISA flags actively exploit vulnerabilities in SonicWall SMA devices

Share This Article
Twitter Copy Link
Previous Article Azure Latch Code April 2025 Azure Latch Code April 2025
Next Article mm How Google’s AI unlocks the secrets of dolphin communication

Latest News

mm

AI is giving pets a voice: The future of cat health care begins with one photo

Artificial intelligence is revolutionizing the way we care for animals.…

May 15, 2025
5 BCDR Essentials for Effective Ransom Defense

5 BCDR Essentials for Effective Ransom Defense

Ransomware has evolved into a deceptive, highly tuned, dangerous and…

May 15, 2025
mm

Anaconda launches the first unified AI platform to redefine enterprise-grade AI development

Anaconda Inc., a longtime leader in Python-based data science, has…

May 14, 2025
Microsoft fixed 78 flaws and exploited five zero-days. CVSS 10 bug affects Azure DevOps servers

Microsoft fixed 78 flaws and exploited five zero-days. CVSS 10 bug affects Azure DevOps servers

On Tuesday, Microsoft shipped fixes to address a total of…

May 14, 2025
mm

Why language models are “lost” in conversation

A new paper from Microsoft Research and Salesforce found that…

May 13, 2025

You Might Also Like

Ransomware Attack
Technology

Moldova police arrest suspect in a 4.5 million euro ransomware attack on a Dutch research institution

2 Min Read
mm
Technology

Future House announces Superintelligent AI agents to revolutionize scientific discovery

7 Min Read
Google deploys AI protection on your device to detect Chrome and Android scams
Technology

Google deploys AI protection on your device to detect Chrome and Android scams

4 Min Read
Zero-Day in Azure Breach
Technology

Commvault confirms that hackers misuse CVE-2025-3928 as zero day in an Azure violation

2 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?