Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Warns of Attacks via HPE Operations Agent

Microsoft Warns of Attacks via HPE Operations Agent

Posted on May 15, 2026 By CWS

Microsoft has issued a warning regarding a sophisticated attack campaign. The campaign, recently uncovered by security experts, involves the misuse of a legitimate enterprise tool, the HPE Operations Agent, to carry out malware-free intrusions.

The attackers gained entry through a compromised third-party IT services provider, then navigated the victim’s system using pre-approved tools. This method allowed them to bypass conventional malware detection, as no traditional malware was executed during the attack.

Exploiting Trusted Tools for Stealthy Intrusions

According to Microsoft Incident Response investigators, the attackers utilized HPE Operations Agent (OA) as a primary delivery mechanism. This tool, commonly used for enterprise monitoring, was not inherently flawed but was repurposed to exploit its trusted status within the target’s IT environment.

The attack campaign persisted for over 100 days, utilizing the HPE Operations Manager (HPOM) managed by a third-party provider. During this period, attackers harvested credentials, accessed critical systems, and maintained undetected access through covert tunnels established with ngrok.

Credential Harvesting and Network Mapping

Throughout the intrusion, attackers focused on credential theft and network reconnaissance. They deployed VBScripts, such as abc003.vbs, to collect system data and map the network. These scripts ran undetected due to their execution through a trusted management platform.

The attackers also implanted web shells on internet-facing servers, creating persistent backdoors. These included files like Errors.aspx and modified Signoff.aspx, which remained active even when other tools were removed.

Recommendations for Enhanced Security

Microsoft advises organizations to enhance their security frameworks by deploying endpoint detection and response (EDR) tools and adopting a default-deny model for outbound traffic. This strategy helps block unauthorized connections and detect unusual activities within the network.

Furthermore, enabling detailed server logging and actively monitoring authentication configurations can help identify stealthy abuses. Removing unnecessary tools that could be exploited and monitoring for unexpected changes are crucial steps in securing IT environments.

The sophistication of this attack highlights a shift in tactics, emphasizing the importance of maintaining vigilance and employing comprehensive security measures to protect against similar threats in the future.

Cyber Security News Tags:credential theft, Cybersecurity, EDR tools, endpoint detection, HPE Operations Agent, lateral movement, Malware-Free Intrusions, Microsoft, network security, Stealth Attacks

Post navigation

Previous Post: Hackers Exploit OrBit Rootkit to Steal Linux Credentials

Related Posts

Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Cyber Security News
Cloudflare Outage Causes Major Global Disruptions Cloudflare Outage Causes Major Global Disruptions Cyber Security News
NWHStealer Malware Targets Windows via Fake VPN Sites NWHStealer Malware Targets Windows via Fake VPN Sites Cyber Security News
Conti Group Member Responsible for Deploying Ransomware Extradited to USA Conti Group Member Responsible for Deploying Ransomware Extradited to USA Cyber Security News
Huge Surge in Fake Investment Platforms Mimic Forex Exchanges Steal Logins Huge Surge in Fake Investment Platforms Mimic Forex Exchanges Steal Logins Cyber Security News
Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Attacks via HPE Operations Agent
  • Hackers Exploit OrBit Rootkit to Steal Linux Credentials
  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed
  • Critical Amazon Redshift JDBC Driver Flaw Exposes RCE Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Attacks via HPE Operations Agent
  • Hackers Exploit OrBit Rootkit to Steal Linux Credentials
  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed
  • Critical Amazon Redshift JDBC Driver Flaw Exposes RCE Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark