Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AzureHound Penetration Testing Tool Exploited by Threat Actors to Enumerate Azure and Entra ID

Posted on October 31, 2025October 31, 2025 By CWS

AzureHound, an open-source knowledge assortment software designed for reputable penetration testing and safety analysis, has grow to be a well-liked weapon within the fingers of refined risk actors.

The software, which is a part of the BloodHound suite, was initially created to assist safety professionals and pink groups establish and repair cloud vulnerabilities.

Nonetheless, malicious actors have more and more misused this functionality to map out Azure environments and uncover pathways for privilege escalation assaults.​

The software operates by gathering knowledge by way of Microsoft Graph and Azure REST Software Programming Interfaces (APIs), permitting it to enumerate Entra ID and Azure environments to assemble details about identities and assets.

Written within the Go programming language and obtainable as precompiled variations for Home windows, Linux, and macOS, AzureHound proves significantly harmful as a result of it doesn’t should be run from inside a sufferer’s community.

Since each APIs are accessible externally, risk actors can launch discovery operations remotely after gaining preliminary entry to compromised techniques.​

When risk actors achieve entry to a sufferer’s Azure atmosphere, they deploy AzureHound to automate discovery procedures that may in any other case require intensive handbook effort.

The software helps attackers uncover person hierarchies, establish high-value targets, and uncover misconfigurations or oblique privilege escalation alternatives that may in any other case stay hidden.

Execution of AzureHound to enumerate customers

By gathering complete inner Azure data, attackers can develop focused assault methods with surgical precision.​ The software outputs knowledge in JSON format, which may be ingested by BloodHound’s visualization capabilities.

This creates a graphical illustration of hidden relationships and assault paths inside the goal’s infrastructure, giving attackers a whole roadmap of the atmosphere they’ve infiltrated.

This mixture of automated discovery and visible evaluation transforms cloud reconnaissance from a time-consuming course of into an environment friendly operation. Latest risk intelligence reveals the widespread adoption of AzureHound throughout a number of adversary teams.

BloodHound illustration of obtainable key vaults

Unit 42 researchers have tracked the Iranian-backed group Curious Serpens, also referred to as Peach Sandstorm and energetic since at the least 2013, leveraging AzureHound to conduct inner discovery operations in opposition to goal Microsoft Entra ID environments.​

In Could 2025, Microsoft disclosed that suspected nation-state risk actor Void Blizzard employed AzureHound throughout the discovery section of their campaigns to enumerate Entra ID configurations.

Extra just lately, in August 2025, Microsoft reported Storm-0501, a ransomware operator, utilizing AzureHound to enumerate goal Entra ID tenants whereas working in hybrid, multi-tenant Azure environments.​

Organizations utilizing Azure and Microsoft Entra ID should acknowledge that instruments like AzureHound depart detectable proof when used maliciously.

Safety groups ought to give attention to detecting irregular API exercise, monitoring for suspicious enumeration patterns, and implementing robust id and entry controls.

AzureHound API take a look at requests

Understanding how risk actors misuse reputable instruments is crucial for constructing efficient detection capabilities and responding rapidly to compromise indicators in cloud environments.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Actors, Azure, AzureHound, Entra, Enumerate, Exploited, Penetration, Testing, Threat, Tool

Post navigation

Previous Post: Japan Issues OT Security Guidance for Semiconductor Factories
Next Post: Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

Related Posts

Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code Cyber Security News
Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks Cyber Security News
Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results Cyber Security News
New SEO Poisoning Attacking Windows Users With Weaponized Software Sites Cyber Security News
BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data Cyber Security News
10 Best API Monitoring Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News