Article Details

Scrape Timestamp (UTC): 2025-04-27 05:05:44.762

Source: https://thehackernews.com/2025/04/storm-1977-hits-education-clouds-with.html

Original Article Text

Click to Toggle View

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers. Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the past year. "The attack involves the use of AzureChecker.exe, a Command Line Interface (CLI) tool that is being used by a wide range of threat actors," the Microsoft Threat Intelligence team said in an analysis. The tech giant noted that it observed the binary to connect to an external server named "sac-auth.nodefunction[.]vip" to retrieve an AES-encrypted data that contains a list of password spray targets. The tool also accepts as input a text file called "accounts.txt" that includes the username and password combinations to be used to carry out the password spray attack. "The threat actor then used the information from both files and posted the credentials to the target tenants for validation," Microsoft said. In one successful instance of account compromise observed by Redmond, the threat actor is said to have taken advantage of a guest account to create a resource group within the compromised subscription. The attackers then created more than 200 containers within the resource group with the ultimate goal of conducting illicit cryptocurrency mining. Microsoft said containerized assets, such as Kubernetes clusters, container registries, and images, are liable to various kinds of attacks, including using - To mitigate such malicious activities, organizations are advised to secure container deployment and runtime, monitor unusual Kubernetes API requests, configure policies to prevent containers from being deployed from untrusted registries and ensure that the images being deployed in containers are free from vulnerabilities.

Daily Brief Summary

CYBERCRIME // Microsoft Uncovers Crypto Mining Scheme Targeting Educational Institutions

Microsoft's threat intelligence team identified a cybercrime group, Storm-1977, targeting educational institutions by deploying password spraying attacks.

The attackers utilized a tool named AzureChecker.exe for conducting these attacks, aiming to compromise cloud accounts within the education sector.

An external server described as "sac-auth.nodefunction[.]vip" was used to retrieve AES-encrypted target data for the password spraying.

Storm-1977 successfully compromised accounts by leveraging leaked credentials and subsequently exploited guest accounts for further malicious activities.

Once inside the compromised systems, the attackers orchestrated the creation of over 200 crypto mining containers to mine cryptocurrency illicitly.

Microsoft advises enhancing security measures for containerized assets and monitoring for abnormal Kubernetes API requests to defend against such compromises.