Get the latest tech news

Ongoing campaign compromises senior execs’ Azure accounts, locks them using MFA | The wide range of employee roles targeted indicates attacker's multifaceted approach


The wide range of employee roles targeted indicates attacker's multifaceted approach.

Hundreds of Microsoft Azure accounts, some belonging to senior executives, are being targeted by unknown attackers in an ongoing campaign that's aiming to steal sensitive data and financial assets from dozens of organizations, researchers with security firm Proofpoint said Monday. The wide breadth of roles targeted indicates the threat actors’ strategy of compromising accounts with access to various resources and responsibilities across affected organizations. “Threat actors seemingly direct their focus toward a wide range of individuals holding diverse titles across different organizations, impacting hundreds of users globally,” a Proofpoint advisory stated.

Get the Android app

Or read this on r/technology

Read more on:

Photo of MFA

MFA

Photo of Senior execs

Senior execs

Photo of wide range

wide range

Related news:

News photo

Microsoft network breached through password-spraying by Russian-state hackers | Senior execs' emails accessed in network breach that wasn't caught for 2 months

News photo

Senators want to know why the SEC’s X account wasn’t secured with MFA

News photo

What to do when receiving unprompted MFA OTP codes