Type
Actors
Pub. date
April 23, 2025
Initial access
Password attack
Impact
Observed techniques
Observed tools
Status
Stub
Last edited
May 13, 2025 2:56 PM
In the past year Microsoft observed AzureChecker(Storm-1977) launching password spray attacks, against cloud tenants in the education sector. The actor used AzureChecker.exe (CLI tool that is being used by a wide range of actors)
- The threat actor downloaded a hidden (encrypted) file from a remote server (sac-auth[.]nodefunction[.]vip). Once unlocked, this file showed a list of accounts they wanted to try breaking into. They also used another file called
accounts.txt
that had many username and password combinations. - The tool combined both sets of data and started trying these logins one by one (password spray attack).
- Microsoft observed one successful attack where the hacker accessed a cloud account via a guest user, created a resource group with over 200 containers, and used them for cryptomining.