Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Russian hackers using “phishing device code” for accounts
Global Security

Russian hackers using “phishing device code” for accounts

AdminBy AdminFebruary 14, 2025No Comments3 Mins Read
device-code-phishing
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 14, 2025Red LakshmananEnterprise Safety / Cyber ​​-Ataka

Cadet-codes

Microsoft draws attention to the new cluster threat that it causes Storm-2372 This was due to the new set of cyber -offices aimed at different sectors since August 2024.

The attacks are aimed at government, non -governmental organizations (NGOs), services and technology of information technology (IT), protection, telecommunications, health, higher education and energy/oil and gas to the east.

The actor threats that with average confidence is evaluated to be coordinated with Russian interests, Viktina and trading means, targeting users using messages such as WhatsApp, Signal and Microsoft, falsely saying that is a well -known person who is relevant to the goal for trying to build trust.

Cybersecurity

“The attacks use a specific phishing technique called” Phishing A Device Cod “, which cheats users login in performance apps, while actors Storm-2372 record information from the entrance (tokens) that they can use to access the compromised Accounts “, Microsoft Intelligence threats – Note In a new report.

The goal is to use authentication codes obtained by accessing target accounts, and abuse that access to obtain sensitive data and ensure constant access to the victim’s environment while the tokens remain valid.

The technical giant said the attack provides for sending phishing sheets that are masked as Microsoft commands, which meet with invitations that call on the recipients of messages to receive authentication using the device code, generated actor, which allows the enemy to steal the authentic session using the true access .

Cadet-codes

“During the attack, the actor threats creates a legitimate request for the device code and is deceiving the purpose of introducing it into the legitimate entry page,” Microsoft explained. “This gives the actor access and allows them to seize authentication – access and update – generated, and then use these tokens to access accounts and Target data.”

Authentication checks can be used to access other services that the user already has permits such as email or cloud storage without the need for password.

Cybersecurity

Microsoft said the valid session is used to move aside to the network, sending similar intra -organization messages to other users from a broken account. In addition, the Microsoft Graph service is used to search for disturbed account.

“The actor threats used keyword search to view messages containing words such as username, password, administrator, TeamViewer, Anydesk, Account, Secret, Service and Government,” said Redmond, adding emails that meet these criteria The filter was studied in the actor threats.

To mitigate the risk that such attacks are recommended by the organization Block stream of the device code Where it is possible, turn on the phishing-resistant to multiform authentication (Foreign Ministry) and follow the principle of the slightest privilege.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.