Threat analysts at Microsoft revealed a phishing campaign targeting remote workers that used stolen credentials to send out more phishing emails and was able to connect with target companies’ Azure Active Directory accounts, BleepingComputer reports.
The multi-stage campaign began with fake DocuSign-themed emails targeting workers in Australia, Indonesia, Singapore and Thailand who did not have multi-factor authentication enabled, with embedded links that redirected victims to a fake Office 365 login page where the threat actors could steal their credentials.
Using the stolen credentials, the attackers then logged into the victims’ email accounts through Outlook installed on their own devices, which allowed them to access the victim company’s Azure Active Directory and register their devices onto the network.
The threat actors would then send emails to addresses within the company network as well as external targets. By infiltrating the company’s trusted workspace, attackers were able to evade the firm’s security measures and lure more victims by displaying an air of legitimacy, the researchers said.
U.S. critical infrastructure organizations have been noted by the Department of Homeland Security to be at risk of cyberattacks leveraging artificial intelligence, with China and other nation-states exploiting the technology to deploy more advanced malware attacks and influence operations, CyberScoop reports.
TechCrunch reports that nearly $200 million was stolen from Hong Kong-based cryptocurrency firm Mixin Network following a cryptocurrency heist on September 23.
Cyberattack compromises Progressive Leasing data Major U.S. consumer product leasing firm Progressive Leasing has disclosed that some of its systems have been impacted by a cyberattack that resulted in the significant compromise of personally identifiable information belonging to its customers and other individuals, according to The Record, a news site by cybersecurity firm Recorded Future.