Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Russian hackers violate 20+ NGOs using Vilginx phishing via fake pages Microsoft Entra
Global Security

Russian hackers violate 20+ NGOs using Vilginx phishing via fake pages Microsoft Entra

AdminBy AdminMay 27, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 27 2025Red Lakshmanan Cloud security / malicious software

Microsoft shed light on a previously undocumented cluster of threats that come from an actor associated with Russia Invalid blizzard (AKA Laundry Bear), which, he said, is explained by the “world abuse of the cloud”.

Active, at least April 2024, the hacking group is related to espionage, mainly oriented to organizations that are important for the goals of the Russian government, including state, protection, transportation, media, non -governmental organizations (NGOs) and in the field of health in Europe and North America.

“They often use stolen details that they most likely buy on online market to access organizations” – Note In a report published today. “Once inside, they steal a large number of letters and files.”

The attacks set by the invalid Blizzard have been revealed, disproportionately nominated by NATO and Ukraine states, suggesting that the opponent is seeking to gather exploration for further Russian strategic purposes.

Cybersecurity

In particular, the actor threats is known to focus on state organizations and law enforcement agencies in the NATO countries, which provide direct military or humanitarian support for Ukraine. It is also said to have organized successful attacks on education, transport and protection of vertical in Ukraine.

This includes a compromise in October 2024. Several accounts of users belonging to the Ukrainian aviation organization previously aimed at Blizzard SeashellThe actor of the threat associated with the Main Intelligence Department of the Russian Staff (GRU) in 2022.

The attacks are characterized as a high -volume situation, which are designed to violate the goals for the Russian government. Initial access methods include unfulfilled methods such as spraying password and stolen authentication credentials.

In some companies, the threatening actor used stolen powers, which are probably derived from the theft of goods available underground for Cybercrime to access exchange and SharePoint on the Internet and the crop and files from the broken organizations.

“The actor threats also in some cases listed the Microsoft Entra Microsoft Entra configuration using Azurehound’s available tool to obtain information about users, roles, groups, applications and devices belonging to this tenant,” Microsoft said.

As recently last month, the Windows manufacturer said she watched as a hacking moving on “more direct methods” to steal passwords, such as sending spear emails that are designed to fool the victims with their information using the enemy in the middle (the middle part (the middle part (the middle partAith) Target pages.

The activity entails the use of print to bring yourself for the Microsoft Entra authentication portal for 20 NGOs in Europe and the US. E -mail messages are said to be from the organizer of the European Protection and Security Summit and contained an attachment of PDF with fake summit invitations.

Cybersecurity

The true desire of the PDF document is a malicious QR code, which redirects to the domain controlled by the attacker (“Micsrosoftonline (.) Com”), which houses the Phisching Page. Believed that the phishing page is based on the open source Evil Phishing -Complex.

After receiving its initial access, after receiving the initial access, the Exchange abuse on the Internet and Microsoft Graph to list users’ mailboxes and files located in the cloud and then use automation to facilitate the data collection. In some cases, which also say that the threatening subjects appealed to the conversations and messages of Microsoft Teams through the web client app.

“Many of the compromised organizations intersect with the past album, in some cases A forest blizzard. North Blizzardand A secret blizzardsaid Microsoft.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.