Security

Research

Ransomware gang using stolen Microsoft Entra ID creds to bust into the cloud

Defenders beware: Data theft, extortion, and backdoors on Storm-0501's agenda


Microsoft's latest threat intelligence blog issues a warning to all organizations about Storm-0501's recent shift in tactics, targeting, and backdooring hybrid cloud environments.

Using a bevy of tactics to achieve its goals, Storm-0501 has a tendency to take control of entire networks via cloud compromises. Members first gain access to on-prem environments before pivoting to the cloud, implanting backdoors for persistent access, and deploying ransomware.

Active since 2021, Storm-0501 is still regarded as an emerging group in Microsoft's view, hence the "Storm" naming convention reserved for groups still in development.

Despite its fledgling status, the group has been prolific in carrying out ransomware attacks as a member of the LockBit, ALPHV, Hive, and Hunters International ransomware affiliate programs. 

More recently, Microsoft spotted it deploying Embargo's ransomware payload, and separately compared it to more established, financially motivated groups such as Octo Tempest (Scattered Spider) and Manatee Tempest (Evil Corp).

A typical Storm-0501 attack is fairly standard – not a lot of surprises. Initial access brokers (IABs) are used for, well, initial access in many cases, while vulnerabilities in public-facing servers are also exploited when needed.

The group targets over-privileged accounts during this phase and once its members gain control of these, they typically utilize Impacket's SecretsDump module to scan for additional credentials that can be used to compromise more accounts. This process is repeated until numerous accounts are under the attackers' control, and in an ideal world for them, this would include multiple Domain Admin accounts.

The old faithful Cobalt Strike is used for lateral movement, which often ends in access to the domain controller and, subsequently, data theft and ransomware deployment.

Recent attacks have given researchers cause for concern, however. During the credential-gathering phase, Storm-0501 used stolen credentials for Entra ID to pivot from on-prem to the cloud environment where they would proceed to implant a backdoor.

The attackers employed two different methods to gain control of Entra ID, the first being compromising Entra Connect Sync service accounts, the credentials of which are saved in an encrypted form on the server's disk or remote SQL server.

"We can assess with high confidence that in the recent Storm-0501 campaign, the threat actor specifically located Microsoft Entra Connect Sync servers and managed to extract the plain text credentials of the Microsoft Entra Connect cloud and on-premises sync accounts," Microsoft wrote.

"We assess that the threat actor was able to achieve this because of the previous malicious activities described in this blog post, such as using Impacket to steal credentials and DPAPI encryption keys, and tampering with security products.

"The compromise of the Microsoft Entra Connect Sync account presents a high risk to the target, as it can allow the threat actor to set or change Microsoft Entra ID passwords of any hybrid account (on-premises account that is synced to Microsoft Entra ID)."

Another tactic Storm-0501 has used to successfully pivot into the cloud is to compromise an on-prem Domain Admin account that has an equivalent in the cloud that's not protected with MFA and also carries a global administrator role.

The sync service isn't available for these kinds of accounts in Entra, so an attacker would have to be lucky enough to find an account that's both unprotected by MFA and also uses the same password as the on-prem account.

Having MFA enabled would make this avenue of attack much more complex and less likely to be successful. In this case, an attacker would have to either tamper with the MFA protection itself or take the extra steps to compromise a user's device, and either hijack its cloud session or extract Entra access tokens.

Whichever route Storm-0501 takes, it often leads to backdoors being implanted for persistent access by creating a federated domain, allowing it to authenticate as any Entra ID tenant user.

Once the target is thoroughly compromised and its data lifted, that's when the ransomware comes in, or doesn't. While Storm-0501 is now opting for Embargo's payload, which follows the typical double extortion model, not all of its attacks lead to ransomware deployment. Some just stopped after the backdoor was established, Microsoft said in its blog, which also includes threat-hunting tips and an extensive collection of indicators of compromise. ®

Send us news
6 Comments

Under Trump 2.0, Europe's dependence on US clouds back under the spotlight

Technologist Bert Hubert tells The Reg Microsoft Outlook is a huge source of geopolitical risk

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

If you dread a Microsoft Teams invite, just wait until it turns out to be a Russian phish

Roses aren't cheap, violets are dear, now all your access token are belong to Vladimir

Ransomware isn't always about the money: Government spies have objectives, too

Analysts tell El Reg why Russia's operators aren't that careful, and why North Korea wants money AND data

London celebrity talent agency reports itself to ICO following Rhysida attack claims

Showbiz members' passport scans already plastered online

Southern Water takes the fifth over alleged $750K Black Basta ransom offer

Leaked chats and spilled secrets as AI helps decode circa 200K private talks

US newspaper publisher uses linguistic gymnastics to avoid saying its outage was due to ransomware

Called it an 'incident' in SEC filing, but encrypted apps and data exfiltration suggest Lee just can’t say the R word

Microsoft shows off novel quantum chip that can scale to 'a million qubits'. So far: Eight

Not just a matter of time but a matter of Majorana fermions, too

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

Microsoft's drawback on datacenter investment may signal AI demand concerns

Investment bank claims software giant ditched 'at least' 5 land parcels due to potential 'oversupply'