Friday , August 29 2025
Storm-0501

Storm-0501 Deletes Data and Backups Post-Exfiltration on Azure in Hybrid Cloud Attacks

Storm-0501 has erased data and backups after stealing information from a victim’s Microsoft Azure environment in a new cloud based ransomware attack. Microsoft Threat Intelligence recently provided details of the tactics deployed by the actor tracked as Storm-0501 in a blog published on August 27.

Sherrod DeGrippo, director of Microsoft threat intelligence strategy told “This technique is likely to be adopted by other threat actors on a broader basis,”.

3 critical vulnerabilities affect Hikvision product: Patch Now

The Hikvision Security Response Center issued advisory revealing three critical vulnerabilities in HikCentral products. CVE identifiers CVE-2025-39245, CVE-2025-39246, and CVE-2025-39247...
Read More
3 critical vulnerabilities affect Hikvision product: Patch Now

Salt Typhoon To Exploit Cisco, Palo Alto, Ivanti Flaws to Breach 600 Org Globally

The China-linked APT group Salt Typhoon is still attacking networks globally, focusing on telecommunications, government, transportation, hospitality, and military sectors....
Read More
Salt Typhoon To Exploit Cisco, Palo Alto, Ivanti Flaws to Breach 600 Org Globally

Storm-0501 Deletes Data and Backups Post-Exfiltration on Azure in Hybrid Cloud Attacks

Storm-0501 has erased data and backups after stealing information from a victim's Microsoft Azure environment in a new cloud based...
Read More
Storm-0501 Deletes Data and Backups Post-Exfiltration on Azure in Hybrid Cloud Attacks

Breaking the Passkey: SquareX Discloses Major Passkey Vulnerability at DEF CON 33

It is no secret that passwords are highly susceptible to phishing and brute force attacks. This led to the mass...
Read More
Breaking the Passkey: SquareX Discloses Major Passkey Vulnerability at DEF CON 33

(CVE-2025-20241)
Cisco Warns of High-Severity Flaw in Nexus Switches

Cisco Systems released a security advisory about a critical denial-of-service vulnerability in the Nexus 3000 and 9000 Series Switches using...
Read More
(CVE-2025-20241)  Cisco Warns of High-Severity Flaw in Nexus Switches

Malaysia Launches World’s First AI-powered Bank

Malaysia is boosting its digital transformation by launching its first fully AI-powered banking service. This initiative, which comes just before...
Read More
Malaysia Launches World’s First AI-powered Bank

ShadowSilk Hits 35 Org in Asia and APAC Using Telegram Bots

Research by Group-IB has linked cyber-attacks on government organizations in Central Asia and the Asia-Pacific to a threat group called...
Read More
ShadowSilk Hits 35 Org in Asia and APAC Using Telegram Bots

Citrix patches critical NetScaler RCE flaw exploited in zero-day attacks

Citrix has issued fixes for three security vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is currently being...
Read More
Citrix patches critical NetScaler RCE flaw exploited in zero-day attacks

Why SIEM Rules Fail and How to Fix: Insights from 160M Attack Simulations

SIEM systems are essential for detecting suspicious activity in enterprise networks, enabling real-time responses to potential attacks. However, the Picus...
Read More
Why SIEM Rules Fail and How to Fix: Insights from 160M Attack Simulations

CVE-2025-9074
Docker Fixes Critical Desktop flaw With CVSS Score 9.3

Docker has issued fixes for a critical security vulnerability in the Docker Desktop app for Windows and macOS that could...
Read More
CVE-2025-9074  Docker Fixes Critical Desktop flaw With CVSS Score 9.3

Storm-0501 Pivots to the Cloud:

In a recent attack, Storm-0501 breached a large company with multiple branches, each managing its own Active Directory.

Post compromise activity impacted two tenants, with the latter ultimately resulting in access to the organization’s valuable data stores that resided in Azure. The attackers looked to pivot from on-premises to the cloud in both the tenants.

The attacker achieved domain administrator privileges in the first tenant. It deployed the post-exploitation tool Evil-WinRM to facilitate lateral movement.

The threat actor also compromised an Entra Connect Sync server, which served as a pivot point for lateral movement.

Additionally, Storm-0501 performed a DCSync attack, a technique that abuses the Directory Replication Service (DRS) Remote Protocol to simulate the behavior of a domain controller. By impersonating a domain controller, the threat actor could request password hashes for any user in the domain, including privileged accounts.

The Entra Connect Sync Directory Synchronization Account (DSA) was used to enumerate users, roles and Azure resources within the tenant.

Storm-0501’s attack chain across the on-premise and cloud tenants. Source: Microsoft

Shortly after, Storm-0501 unsuccessfully attempted to sign in as several privileged users, likely blocked by conditional access policies and multifactor authentication (MFA).

The attacker found an identity that wasn’t human and had the Global Administrator role in Microsoft Entra ID. This account didn’t have MFA set up, allowing them to reset the user’s password on-premises, which was then synced to the cloud identity.

This allowed the threat actor to authenticate against Entra ID as that user via the new password, also registering a new MFA method under their control.

“From the point that the threat actor was able to successfully meet the Conditional Access policies and sign in to the Azure portal as a Global Admin account, Storm-0501 essentially achieved full control over the cloud domain. The threat actor then utilized the highest possible cloud privileges to obtain their goals in the cloud,” the researchers noted.

How to Defend Against Cloud-Based Ransomware Tactics:

These are practical steps for security teams to guard against the tactics used by Storm-0501 in this incident. These include:

  • Enable Azure blob backup to protect from accidental or malicious deletions of blobs or storage accounts
  • Apply the principle of least privilege when authorizing access to blob data in Azure Storage
  • Enable logs in Azure Key Vault and retain them for up to a year to enable recreation of activity trails for investigation purposes
  • Enable Microsoft Azure Backup for virtual machines to protect the data on your Microsoft Azure virtual machines
  • Investigate on-premises and hybrid Microsoft Security Exposure Management attack paths

Check Also

cisco

(CVE-2025-20241)
Cisco Warns of High-Severity Flaw in Nexus Switches

Cisco Systems released a security advisory about a critical denial-of-service vulnerability in the Nexus 3000 …