Cyber Security News

Microsoft Warns of Ransomware Exploiting Cloud Environments with New Techniques

Microsoft has issued an alert regarding sophisticated ransomware attacks targeting hybrid cloud environments in Q1 2025.

These attacks exploit vulnerabilities at the intersection of on-premises infrastructure and cloud services, challenging organizations with hybrid configurations.

In a significant shift, North Korean state actor Moonstone Sleet has deployed Qilin ransomware in targeted attacks.

This marks their first operation as a ransomware-as-a-service affiliate rather than using custom malware, indicating tactical evolution to increase efficiency while maintaining plausible deniability.

Microsoft Threat Intelligence researchers identified threat actor Storm-0501 utilizing enhanced capabilities for lateral movement from on-premises systems to cloud infrastructure.

Their analysis uncovered techniques targeting unmanaged devices and exploiting insecure hybrid accounts to access critical resources, delete backups, and deploy ransomware.

A February leak of Black Basta ransomware group chats exposed their technical methods, including exploitation of Citrix, Jenkins, and VPN vulnerabilities.

Other active groups included Lace Tempest and Storm-1175, with the latter exploiting new SimpleHelp vulnerabilities shortly after disclosure.

Social engineering remains prevalent, with actors initiating contact through fake IT support calls before deploying remote access tools. Storm-1674 was observed using fake IT calls through Microsoft Teams, leading to Quick Assist and PowerShell usage.

Hybrid Cloud Exploitation Techniques

Storm-0501’s cloud compromise methodology begins with lateral movement from compromised on-premises systems through insecure hybrid identity configurations.

After gaining initial access, attackers target accounts with excessive permissions across environments. This approach allows them to pivot seamlessly between traditional infrastructure and cloud resources.

The attack chain typically includes specific HTTP requests targeting configuration files:-

GET /toolbox-resource/../serverconfig.xml

This path traversal technique exposes authentication tokens and federation settings, allowing attackers to bypass multi-factor authentication by exploiting trust relationships between identity systems.

Microsoft recommends implementing credential hygiene, applying least privilege principles, and adopting Zero Trust architectures to protect hybrid environments.

Organizations should also closely monitor for unusual authentication patterns that may indicate compromise of hybrid identity systems.

Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System

Google has issued an urgent security update for its Chrome web browser to address three…

3 hours ago

Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access

Cybersecurity professionals are facing an unprecedented acceleration in threat actor capabilities as the average breakout…

5 hours ago

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

A sophisticated malware campaign has emerged in the npm ecosystem, utilizing an innovative steganographic technique…

5 hours ago

Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware

Zloader, a sophisticated Zeus-based modular trojan that first emerged in 2015, has undergone a significant…

6 hours ago

Beware of Fake Online Speedtest Application With Obfuscated JS Codes

A sophisticated malware campaign has emerged that leverages fake online speed test applications to deploy…

10 hours ago

Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors

Defy Security, a leading provider of cybersecurity solutions and services, today announced the appointment of…

12 hours ago