CTI Swarm
Zurück zu heute
NEU Storm-2949 HIGH

How Storm-2949 turned a compromised identity into a cloud-wide breach

Microsoft Security Blog ·

Key Insight

Storm-2949 demonstriert, wie Angreifer kompromittierte Identitäten zur Lateral-Bewegung in cloudweit verteilten Systemen nutzen , ein kritisches Risiko für Unternehmen, die auf Microsoft 365 und Entra ID angewiesen sind und in DACH-Region mit erhöhtem APT-Druck rechnen müssen.

Beschreibung

How Storm-2949 turned a compromised identity into a cloud-wide breach | Microsoft Security Blog

  • Use the Azure Monitor activity log to investigate and monitor Azure management events.
  • Configure and harden resources firewall rules and access controls to allow access only from trusted IP ranges and virtual networks to prevent unauthorized access.
  • Use Azure policies to continuously enforce the hardened configurations.
  • Practice and apply Azure Storage security best practices:
  • Use Azure policies for Azure Storage to prevent network and security misconfigurations and maximize the protection of business data stored in your storage accounts.
  • Implement Azure Blob Storage security recommendations for enhanced data protection.
  • Use the options available for data protection in Azure Storage.
  • Enable immutable storage for Azure Blob Storage to protect from accidental or malicious modification or deletion of blobs or storage accounts.
  • Enable Azure Monitor for Azure Blob Storage to collect, aggregate, and log data to enable recreation of activity trails for investigation purposes when a security incident occurs or network is compromised.
  • Use private endpoints for Azure Storage account access to disable public network access for increased security.
  • Avoid using anonymous read access for blob data.
  • EnableAzure blob backup to protect from accidental or malicious deletions of blobs or storage accounts.
  • Secure accounts with credential hygiene. Practice the principle of least privilege and audit privileged account activity in your Microsoft Entra ID and Azure environments to slow or stop threat actors.

Shortly after the initial access, the threat actor operated in parallel, trying to compromise the

Risk Score

20
cvss base
0.00
kev bonus
0.00
epss bonus
0.00
poc bonus
0.00
raw before weight
0.00
industry weight
1.30
freshness factor
1.00
days old
0.00
vendor mismatch penalty
0.00

Pfad: operational