Security

Microsoft sues 'foreign-based' cyber-crooks, seizes sites used to abuse AI

Scumbags stole API keys, then started a hacking-as-a-service biz, it is claimed


Microsoft has sued a group of unnamed cybercriminals who developed tools to bypass safety guardrails in its generative AI tools. The tools were used to create harmful content, and access to the tools were sold as a service to other miscreants.

The lawsuit, filed in December in a US District Court, accuses 10 defendants of using API keys stolen from "multiple" Microsoft customers along with custom-designed software to break into computers running Microsoft's Azure Open AI service. 

Microsoft says it uncovered the scheme in July 2024, but the exact way in which the criminals stole the API keys is unknown.

While the legal complaint doesn't identify any of the 10 defendants, Steven Masada, assistant general counsel for Microsoft's Digital Crimes Unit,  described the criminals as a "foreign-based threat–actor group." 

The lawsuit accuses the 10 of violating the federal laws including the Computer Fraud and Abuse Act, the Digital Millennium Copyright Act, and the Racketeer Influenced and Corrupt Organizations Act (RICO), and seeks relief and damages related to the "creation, control, maintenance, trafficking, and ongoing use of illegal computer networks and piratical software to cause harm to Microsoft, its customers, and the public at large" [PDF].

In addition to the complaint, the newly unsealed court documents also include a court order [PDF] allowing Microsoft to seize web domains used in the criminal operation. This, according to Masada, will "allow us to gather crucial evidence about the individuals behind these operations, to decipher how these services are monetized, and to disrupt additional technical infrastructure we find."

After using the stolen customer credentials to break into Azure, the complaint alleges, intruders used this illicit access to "create harmful content in violation of Microsoft's policies and through circumvention of Microsoft's technical protective measures."

Plus, the digital thieves resold this access as a "hacking-as-a-service scheme" to other criminals, the lawsuit claims:

First, Defendants created a client-side software tool referred to by Defendants as "de3u," which Defendants make publicly available via the "rentry.org/dc3u" domain. Second,Defendants created software for running a reverse proxy service, referred to as the "oai reverse proxy," designed specifically for processing and routing communications from the de3u software to Microsoft's systems.

The de3u software, according to the lawsuit, allows users to issue Microsoft API calls to generate images using the DALL-E model, which is available to Azure OpenAI Service customers. 

"Using an open source software package, [the] defendants built a web application that implements a custom layout and data flow designed specifically for using tools like DALL-E to generate images using text prompts," the court documents claim.

Microsoft has since boosted its genAI guardrails and added safety mitigations that it says help prevent this type of abuse. It did not provide specific details about what these new safety measures include. ®

Send us news
4 Comments

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Under Trump 2.0, Europe's dependence on US clouds back under the spotlight

Technologist Bert Hubert tells The Reg Microsoft Outlook is a huge source of geopolitical risk

If you dread a Microsoft Teams invite, just wait until it turns out to be a Russian phish

Roses aren't cheap, violets are dear, now all your access token are belong to Vladimir

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

Said bugs 'can have significant implications' – glad to hear that from Redmond

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

Russia's Sandworm caught snarfing credentials, data from American and Brit orgs

'Near-global' initial access campaign active since 2021

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime