Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Amazon Disrupts Russian Hacking Campaign Targeting Microsoft Users

Posted on September 2, 2025September 2, 2025 By CWS

Amazon has disrupted a Russian watering gap marketing campaign focusing on Microsoft customers by way of compromised web sites opportunistically redirecting customers to malicious infrastructure.

Attributed to the state-sponsored cyberespionage group often known as Midnight Blizzard (additionally tracked as APT29, Cozy Bear, the Dukes, and Yttrium) and believed to be sponsored by the Russian Overseas Intelligence Service (SVR), the assaults had been centered on credential harvesting and intelligence assortment.

The APT compromised legit web sites and injected JavaScript code that redirected guests to domains managed by the attackers, akin to findcloudflare[.]com, which mimicked a Cloudflare verification web page.

As soon as redirected to the malicious domains, the victims had been tricked into logging into their Microsoft accounts and authorizing units below the attacker’s management, by the Microsoft machine code authentication stream.

In response to Amazon CISO CJ Moses, solely roughly 10% of the compromised web site’s guests had been redirected to the risk actor-controlled domains.

“This opportunistic strategy illustrates APT29’s continued evolution in scaling their operations to forged a wider internet of their intelligence assortment efforts,” Moses notes.

As a part of the assaults, Midnight Blizzard relied on randomization to solely redirect a small share of tourists, hid malicious code utilizing base64 encoding, and arrange cookies to forestall the repeated redirection of the identical victims.

When blocked, the attackers shortly arrange new infrastructure, together with by transferring to a brand new cloud supplier and by registering the area cloudflare[.]redirectpartners[.]com, AWS says.Commercial. Scroll to proceed studying.

“There was no compromise of AWS techniques, nor was there a direct affect noticed on AWS companies or infrastructure,” Moses factors out.

Final 12 months, Midnight Blizzard impersonated AWS and Microsoft staff to ship RDP configuration recordsdata to unsuspecting customers. In June 2025, Google warned of APT’s assaults focusing on the “app-specific password” function to trick Gmail customers into offering MFA-free entry to their accounts.

Associated: Russian State Hackers Goal Organizations With Machine Code Phishing

Associated: HPE Says Private Info Stolen in 2023 Russian Hack

Associated: Russian APT Exploiting 7-12 months-Previous Cisco Vulnerability: FBI

Associated: Norwegian Police Say Professional-Russian Hackers Have been Seemingly Behind Suspected Sabotage at a Dam

Security Week News Tags:Amazon, Campaign, Disrupts, Hacking, Microsoft, Russian, Targeting, Users

Post navigation

Previous Post: WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users
Next Post: Hackers Stole Customer Data from Salesforce Instances

Related Posts

Data Breach at Debt Settlement Firm Impacts 160,000 People Security Week News
Godfather Android Trojan Creates Sandbox on Infected Devices Security Week News
Critical Cisco ISE Vulnerabilities Allow Remote Code Execution  Security Week News
Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC Security Week News
200,000 Harbin Clinic Patients Impacted by NRS Data Breach Security Week News
$1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025 Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers
  • How IOC Feeds Streamline Response and Threat Hunting for Best SOC Teams 
  • Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE
  • Ukrainian Networks Launch Massive Brute-Force and Password-Spraying Campaigns Targeting SSL VPN and RDP Systems
  • Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers
  • How IOC Feeds Streamline Response and Threat Hunting for Best SOC Teams 
  • Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE
  • Ukrainian Networks Launch Massive Brute-Force and Password-Spraying Campaigns Targeting SSL VPN and RDP Systems
  • Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News