BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals use trusted Microsoft developers to hack corporate emails


    Microsoft said it has disabled fake Microsoft Partner Network (MPN) accounts that were used to create malicious OAuth applications as part of a malicious campaign aimed at hacking into organizations' clouds and stealing email.

    According to Microsoft, the apps created by the scammers were then used in a phishing campaign called "consent phishing" in which the attackers tricked users into granting permissions to the rogue apps. This phishing campaign targets a group of users in the UK and Ireland.

    Microsoft became aware of this campaign on December 15, 2022. The company has since notified affected customers via email and noted that the attackers also managed to exfiltrate user emails during the campaign. Microsoft has also implemented additional security measures to improve the verification process associated with the Microsoft Cloud Partner Program (formerly MPN) and minimize the possibility of future fraud.

    According to a Proofpoint report, this campaign is notable because hackers, imitating popular brands, were able to trick Microsoft into getting a blue confirmation badge. The hackers used fake verified publisher accounts to pass verification, infiltrate organizations' cloud environments, and distribute fraudulent OAuth applications they created in Azure AD.

    These attacks used similar versions of legitimate applications such as Zoom to trick targets into allowing access and facilitate data theft. The victims were financiers, marketers, managers and senior executives.

    Proofpoint noted that malicious OAuth applications obtained permissions to read email, configure mailbox settings, and gain access to files and other data associated with a user account.

    The two applications in question were named "Single Sign-on (SSO)", and the third application, called "Meeting", mimicked well-known video conferencing software. All three applications, created by three different publishers, target the same companies and use the same attacker-controlled infrastructure.

    The campaign ended on December 27, 2022, after Proofpoint informed Microsoft of the December 20 attack and the apps were disabled. These campaigns demonstrate the sophistication of the attack, not to mention bypassing Microsoft protections and violating user trust in service providers.

    Author DeepWeb
    New vulnerabilities discovered in American Megatrends software
    What weed can be used in medicine?

    Comments 0

    Add comment