Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Storm-1977 enters the educational clouds with Azurechecker, deployed 200+ Crypto mining containers
Global Security

Storm-1977 enters the educational clouds with Azurechecker, deployed 200+ Crypto mining containers

AdminBy AdminApril 27, 2025No Comments2 Mins Read
Clouds with AzureChecker
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 27, 2025Red LakshmananKubernetes / Cloud Security

Clouds with azurechecker

Microsoft revealed that the actor threats he tracks as the Storm-1977 Password attack attacks Against cloud tenants in the education sector over the last year.

“The attack provides use of the AzurecheCker.exe command line tool used by a wide range of threat subjects,” Microsoft Intelligence team – Note In the analysis.

The technical giant noted that he watched the binary connection to the external server called “Sac-Auth.nodeFunction (.) VIP to get the data registered AES containing a password spray target.

The tool also accepts as an entry text file called “Uxitals.txt”, which includes user combinations and passwords that will be used to attack password spraying.

“Then the threatening actor used information from both files and posted the target -tinker credentials,” Microsoft said.

Cybersecurity

In one of the successful copies of the account observed Redmond, the actor of the threat took advantage of the guests’ account to create a group of resources as part of a violated subscription.

The attackers then created more than 200 containers in a group of resources with the ultimate purpose of illegal mining of the cryptocurrency.

Microsoft said liable by Different types of attacksincluding use –

  • Compromised cloud credentials to facilitate cluster’s absorption
  • Images of containers with vulnerability and wrong
  • Incorrectly tuned control interfaces to access API Kubernetes and deploy malicious containers or steal the whole cluster
  • Nodes running on a vulnerable code or software

To mitigate such malicious activities, organizations are advised to provide containers and time deployment, control the unusual API Kubernetes requests, set up a policy to avoid deployment of containers from unreliable registrations and ensure that images are unfolding in containers.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.