Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Amazon Disrupts Russian Hacking Campaign Targeting Microsoft Users

Posted on September 2, 2025September 2, 2025 By CWS

Amazon has disrupted a Russian watering gap marketing campaign focusing on Microsoft customers by way of compromised web sites opportunistically redirecting customers to malicious infrastructure.

Attributed to the state-sponsored cyberespionage group often known as Midnight Blizzard (additionally tracked as APT29, Cozy Bear, the Dukes, and Yttrium) and believed to be sponsored by the Russian Overseas Intelligence Service (SVR), the assaults had been centered on credential harvesting and intelligence assortment.

The APT compromised legit web sites and injected JavaScript code that redirected guests to domains managed by the attackers, akin to findcloudflare[.]com, which mimicked a Cloudflare verification web page.

As soon as redirected to the malicious domains, the victims had been tricked into logging into their Microsoft accounts and authorizing units below the attacker’s management, by the Microsoft machine code authentication stream.

In response to Amazon CISO CJ Moses, solely roughly 10% of the compromised web site’s guests had been redirected to the risk actor-controlled domains.

“This opportunistic strategy illustrates APT29’s continued evolution in scaling their operations to forged a wider internet of their intelligence assortment efforts,” Moses notes.

As a part of the assaults, Midnight Blizzard relied on randomization to solely redirect a small share of tourists, hid malicious code utilizing base64 encoding, and arrange cookies to forestall the repeated redirection of the identical victims.

When blocked, the attackers shortly arrange new infrastructure, together with by transferring to a brand new cloud supplier and by registering the area cloudflare[.]redirectpartners[.]com, AWS says.Commercial. Scroll to proceed studying.

“There was no compromise of AWS techniques, nor was there a direct affect noticed on AWS companies or infrastructure,” Moses factors out.

Final 12 months, Midnight Blizzard impersonated AWS and Microsoft staff to ship RDP configuration recordsdata to unsuspecting customers. In June 2025, Google warned of APT’s assaults focusing on the “app-specific password” function to trick Gmail customers into offering MFA-free entry to their accounts.

Associated: Russian State Hackers Goal Organizations With Machine Code Phishing

Associated: HPE Says Private Info Stolen in 2023 Russian Hack

Associated: Russian APT Exploiting 7-12 months-Previous Cisco Vulnerability: FBI

Associated: Norwegian Police Say Professional-Russian Hackers Have been Seemingly Behind Suspected Sabotage at a Dam

Security Week News Tags:Amazon, Campaign, Disrupts, Hacking, Microsoft, Russian, Targeting, Users

Post navigation

Previous Post: WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users
Next Post: Hackers Stole Customer Data from Salesforce Instances

Related Posts

Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities Security Week News
US Sanctions Myanmar Militia Involved in Cyber Scams  Security Week News
Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers Security Week News
German Authorities Take Down Crypto Swapping Service eXch Security Week News
Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise Security Week News
Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False
  • New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
  • Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False
  • New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
  • Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News