Quantcast
Channel: Threat actors | Latest Threats | Microsoft Security Blog
Browsing all 13 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Flax Typhoon using legitimate software to quietly access Taiwanese organizations

Summary Microsoft has identified a nation-state activity group tracked as Flax Typhoon, based in China, that is targeting dozens of organizations in Taiwan with the likely intention of performing...

View Article



Image may be NSFW.
Clik here to view.

Malware distributor Storm-0324 facilitates ransomware access

The threat actor that Microsoft tracks as Storm-0324 is a financially motivated group known to gain initial access using email-based initial infection vectors and then hand off access to compromised...

View Article

Image may be NSFW.
Clik here to view.

Peach Sandstorm password spray campaigns enable intelligence collection at...

Since February 2023, Microsoft has observed password spray activity against thousands of organizations carried out  by an actor we track as Peach Sandstorm (HOLMIUM). Peach Sandstorm is an Iranian...

View Article

Image may be NSFW.
Clik here to view.

Automatic disruption of human-operated attacks through containment of...

Our experience and insights from real-world incidents tell us that the swift containment of compromised user accounts is key to disrupting hands-on-keyboard attacks, especially those that involve...

View Article

Image may be NSFW.
Clik here to view.

Multiple North Korean threat actors exploiting the TeamCity CVE-2023-42793...

Since early October 2023, Microsoft has observed two North Korean nation-state threat actors – Diamond Sleet and Onyx Sleet – exploiting CVE-2023-42793, a remote-code execution vulnerability affecting...

View Article


Image may be NSFW.
Clik here to view.

Octo Tempest crosses boundaries to facilitate extortion, encryption, and...

Microsoft has been tracking activity related to the financially motivated threat actor Octo Tempest, whose evolving campaigns represent a growing concern for organizations across multiple industries....

View Article

Microsoft shares threat intelligence at CYBERWARCON 2023

At the CYBERWARCON 2023 conference, Microsoft and LinkedIn analysts are presenting several sessions detailing analysis across multiple sets of threat actors and related activity. This blog is intended...

View Article

Image may be NSFW.
Clik here to view.

Diamond Sleet supply chain compromise distributes a modified CyberLink installer

Microsoft Threat Intelligence has uncovered a supply chain attack by the North Korea-based threat actor Diamond Sleet (ZINC) involving a malicious variant of an application developed by CyberLink...

View Article


Image may be NSFW.
Clik here to view.

Star Blizzard increases sophistication and evasion in ongoing attacks

Microsoft Threat Intelligence continues to track and disrupt malicious activity attributed to a Russian state-sponsored actor we track as Star Blizzard (formerly SEABORGIUM, also known as COLDRIVER...

View Article


Image may be NSFW.
Clik here to view.

Financially motivated threat actors misusing App Installer

Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilizing the...

View Article

Image may be NSFW.
Clik here to view.

New TTPs observed in Mint Sandstorm campaign targeting high-profile...

Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research...

View Article

Midnight Blizzard: Guidance for responders on nation-state attack

The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response process to investigate, disrupt malicious activity,...

View Article

Staying ahead of threat actors in the age of AI

Over the last year, the speed, scale, and sophistication of attacks has increased alongside the rapid development and adoption of AI. Defenders are only beginning to recognize and apply the power of...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images