Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks

Posted on August 29, 2025August 29, 2025 By CWS

The financially motivated menace actor tracked as Storm-0501 has shifted deal with focusing on cloud environments for knowledge theft and extortion, Microsoft warns.

Lively since not less than 2021, Storm-0501 is thought for utilizing varied ransomware households in assaults towards on-premise and hybrid cloud environments, together with Sabbath, Alphv/BlackCat, Hive, Hunters Worldwide, LockBit, and Embargo.

Final yr, the hacking group was seen compromising Lively Listing environments, shifting to Entra ID, escalating privileges to world administrator, implanting backdoors in Entra ID tenant configurations, and deploying on-premises ransomware for file encryption.

In a current assault towards a big enterprise, the menace actor used related ways: it compromised a number of Lively Listing domains, carried out reconnaissance to determine protected endpoints and evade detection, and moved laterally utilizing the Evil-WinRM post-exploitation device.

Storm-0501 then compromised an Entra Join Sync server and impersonated the area controller to request password hashes for area customers. It additionally enumerated customers, roles, and Azure assets, and tried to log in as a number of privileged customers.

Unsuccessful of their login makes an attempt, the hackers then traversed between Lively Listing domains, compromised one other Entra Join server, recognized a non-human synced identification that had world administrator privileges in Entra ID, and reset its password to entry the account.

“Consequently, the menace actor was in a position to authenticate towards Entra ID as that person utilizing the brand new password. Since no MFA was registered to that person, after efficiently authenticating utilizing the newly assigned password, the menace actor was redirected to easily register a brand new MFA methodology beneath their management,” Microsoft explains.

After figuring out a Microsoft Entra hybrid joined machine, Storm-0501 was in a position to entry the Azure portal as world admin, gaining full management over the cloud area. It instantly deployed a backdoor permitting them to register as any person, by registering a brand new Entra ID tenant.Commercial. Scroll to proceed studying.

Armed with top-level Entra ID privileges, the hackers elevated their privileges to the Proprietor Azure position over all of the sufferer’s Azure subscriptions, primarily taking up the whole Azure surroundings.

“We assess that the menace actor initiated a complete discovery part utilizing varied strategies, together with the utilization of the AzureHound device, the place they tried to find the group’s vital property, together with knowledge shops that contained delicate data, and knowledge retailer assets that are supposed to again up on-premises and cloud endpoint units,” Microsoft notes.

The attackers additionally focused Azure Storage accounts, abusing the Azure Proprietor position to steal their entry keys after which exposing accounts that have been non-internet accessible to the online and their very own infrastructure, after which used the AzCopy Command-line device (CLI) for knowledge exfiltration.

After stealing the info, the hackers initiated its mass-deletion to forestall remediation actions. Additionally they tried to erase protections stopping the deletion of some knowledge, and leveraged cloud-based encryption for these assets that might not be erased.

“After efficiently exfiltrating and destroying the info inside the Azure surroundings, the menace actor initiated the extortion part, the place they contacted the victims utilizing Microsoft Groups utilizing one of many beforehand compromised customers, demanding ransom,” Microsoft says.

The tech big additionally factors out that, after compromising the sufferer’s cloud surroundings, Storm-0501 relied on cloud-native instructions and performance to carry out reconnaissance, lateral motion, credential exfiltration, privilege escalation, and knowledge exfiltration, deletion, and encryption.

“Storm-0501 has continued to exhibit proficiency in shifting between on-premises and cloud environments, exemplifying how menace actors adapt as hybrid cloud adoption grows. They hunt for unmanaged units and safety gaps in hybrid cloud environments to evade detection and escalate cloud privileges and, in some instances, traverse tenants in multi-tenant setups to attain their objectives,” the corporate notes.

Associated: A whole lot of Salesforce Prospects Hit by Widespread Knowledge Theft Marketing campaign

Associated: Groucho’s Wit, Cloud Complexity, and the Case for Constant Safety Coverage

Associated: ImageRunner Flaw Uncovered Delicate Data in Google CloudRelated:Multi-Cloud Networks Require Cloud-Native Safety

Security Week News Tags:Attacks, Azure, Cloud, Control, Enterprise, Exploits, Full, Gains, Gaps, Group, Hybrid, Ransomware

Post navigation

Previous Post: DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs
Next Post: US Sanctions Russian National, Chinese Firm Aiding North Korean IT Workers

Related Posts

Aspire Rural Health System Data Breach Impacts Nearly 140,000 Security Week News
Clorox Sues Cognizant for $380 Million Over 2023 Hack Security Week News
Canadian Electric Utility Lists Customer Information Stolen by Hackers Security Week News
Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play Security Week News
Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Security Week News
Security Theater or Real Defense? The KPIs That Tell the Truth Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution
  • WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users
  • Citrix Netscaler 0-day RCE Vulnerability Patched
  • NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads
  • NightSpire Ransomware Group Claims to Exploit The Vulnerabilities of Orgs to Infiltrate Their Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution
  • WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users
  • Citrix Netscaler 0-day RCE Vulnerability Patched
  • NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads
  • NightSpire Ransomware Group Claims to Exploit The Vulnerabilities of Orgs to Infiltrate Their Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News