Malicious actors have launched phishing attacks exploiting Microsoft Azure's Static Web Apps service to exfiltrate Microsoft, Outlook, Office365, and OneDrive account credentials, according to BleepingComputer.
Attackers have used the Azure Static Web Apps platform to create fake landing pages and login forms resembling official Microsoft pages, said MalwareHunterTeam.
MalwareHunterTeam noted that the *.1.azurestaticapps.net wildcard TLS certificate enables all landing pages to obtain their own secure page padlock in the address bar, potentially deceiving even the most suspicious targets. Such detail in the landing pages also enables threat actors to target users of Yahoo, AOL, Rackspace, and other email providers.
While users could identify phishing campaigns by checking the URL of the pages they visit, such advice is nearly worthless under the new phishing scheme. The new phishing campaign follows the prior use of Microsoft Azure Blob Storage's *.blob.core.windows.net wildcard certificate to target users of Outlook and Office 365, BleepingComputer reports.
Nation state-sponsored advanced persistent threats Sandworm and Volt Typhoon and various distributed denial-of-service botnets were noted by Amazon Web Services to have been thwarted using its new MadPot internal threat intelligence decoy system, reports SecurityWeek.
Newsweek reports that Netflix has been affected by outages in certain portions of the U.S., Brazil, Russia, Poland, Turkey, Japan, Hong Kong, the United Arab Emirates, and the UK, on Sept. 28 following a distributed denial-of-service attack by self-proclaimed hacktivist operation Anonymous Sudan.
Modern integrated graphics processing units, including those manufactured by AMD, Arm, Apple, Intel, Qualcomm, and Nvidia, could be targeted to expose sensitive data through the new GPU.zip side-channel attack, which exploits graphical data compression, The Hacker News reports.