[Live Webinar] Next-Level O11y: Why Every DevOps Team Needs a RUM Strategy Register today!

Azure Security Compromised – Hundreds Fell Victim to Phishing

  • Aseem Rastogi and Jayashwa Chauhan
  • February 29, 2024
Share article

In late November 2023, a phishing campaign successfully compromised hundreds of user accounts, including those belonging to high-ranking executives, across dozens of Microsoft Azure environments.

Cybercriminals behind such campaigns specifically target executives due to their potential access to sensitive corporate information, the ability to authorize fraudulent financial transactions without raising suspicion, and the potential to gain entry into critical systems that can serve as launchpads for broader attacks within the organization or its partner networks.

This incident is a stark reminder for individuals and organizations to remain vigilant against phishing attempts. Implementing robust security measures like multi-factor authentication and employee awareness training can significantly reduce the risk of falling victim to such scams. Organizations should also consider conducting regular penetration testing to identify and address system vulnerabilities.

What is a Phishing Attack 

These types of attacks can be quite easy to fall for. The attacker will send an email containing malicious documents or links, including a message of urgency, prompting the receiver to take action. Once the user clicks on the document or link, they will be routed to the phishing pages where the attacker can steal the user’s credentials and information. At this point, the attacker has successfully gained access to privileged accounts and can escalate access to sensitive information and critical systems. 

Azure Phishing Attack Campaign Details

The Breach Attack chain described above was initially detected by security experts at Proofpoint, an email threat management company. 

Security analysts uncovered specific Linux user agent strings and domains attackers used to gain unauthorized access to Microsoft 365 applications. These user agents should be a red flag for organizations using Microsoft 365. These IOCs are linked to many post-compromise activities, including bypassing multi-factor authentication (MFA), stealing sensitive data (exfiltration), and launching phishing attacks internally and externally.

Proofpoint identified unauthorized access to critical Microsoft365 components, including:

  • Office365 Shell WCSS-Client – This suggests attackers might use your browser as a foothold for further actions.
  • Office 365 Exchange Online – Stealing confidential emails and sensitive data.
  • My Signins – This indicates attackers might be trying to bypass MFA and gain unauthorized access.
  • My Apps – Attackers might exploit this to alter settings, grant themselves access, or disrupt functionalities.
  • My Profile – This tactic maintains unauthorized access or elevates privileges for broader attacks.

Who Was Impacted

The malicious phishing campaign targeted a broad spectrum of individuals within numerous organizations utilizing AzureAD. 

Not only were senior executives like Vice Presidents, CFOs, and CEOs impacted, but employees across various roles, such as Sales Directors, Account Managers, and Finance Managers, also fell victim.

This widespread attack highlights the need for robust security measures across all levels of an organization, as even seemingly lower-level positions, can grant access to sensitive data and resources if compromised.

Indicators of Compromise (IoC)

  • User Agent involved in attack’s access phase
    • Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
  • User Agent involved in attack’s access and post-access phases
    • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
    • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
  • Domain used for targeted phishing threats
    • Sachacel[.]ru
  • Source domain used as malicious infrastructure
    • Lobnya[.]com
    • Makeapp[.]today
    •  Alexhost[.]com
    • Mol[.]ru
    • Smartape[.]net
    • Airtel[.]com
    • Mtnonline[.]com
    • Acedatacenter[.]com
  • Source ISP used as malicious infrastructure
    • Sokolov Dmitry Nikolaevich
    • Dom Tehniki Ltd
    • Selena Telecom LLC

Action Taken by Coralogix Security 

The Coralogix security team promptly got into action as soon as this breach was disclosed. They reviewed the Azure environment of our SRC customers for related IoCs and contacted the ones where we witnessed suspicious activity. They also reviewed that all out-of-the-box Azure extension alerts had been appropriately deployed and updated. 

What We Recommend for Customers

For customers using Azure, it’s best to monitor logs for the specific user-agent string shared above and suspicious source domains. It’s best to immediately reset passwords for compromised accounts and change all user passwords periodically.

Use security monitoring tools to detect and identify account takeover attempts. Implement industry-standard protections against phishing, brute-forcing, and password-spraying attacks. Lastly, implement automated threat response policies for faster reaction and damage control. 

You can learn more about what you can gain from the Coralogix security offering here

Where Modern Observability
and Financial Savvy Meet.

Live Webinar
Next-Level O11y: Why Every DevOps Team Needs a RUM Strategy
April 30th at 12pm ET | 6pm CET
Save my Seat