Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Researchers reported that the hacking group APT29, linked to Russia’s Foreign Intelligence Service (SVR), launched phishing attacks on over 40 organizations worldwide, including government agencies. The group used compromised Microsoft 365 tenants to create technical support-themed domains and sent lures to trick users into approving multifactor authentication prompts, aiming to steal their credentials.
“Using these domains from compromised tenants, Midnight Blizzard leverages Teams messages to send lures that attempt to steal credentials from a targeted organization by engaging a user and eliciting approval of multifactor authentication (MFA) prompts.”
The attackers utilized onmicrosoft.com domains, a legitimate Microsoft domain, to make the fake Microsoft support messages appear trustworthy. The objective was to steal targeted users’ credentials and add unauthorized devices to organizations to bypass access restrictions. Microsoft successfully blocked the threat group from using the domains in further attacks and is actively mitigating the campaign’s impact.
“If the target user accepts the message request, the user then receives a Microsoft Teams message from the attacker attempting to convince them to enter a code into the Microsoft Authenticator app on their mobile device”, they added
In certain instances, the actor endeavors to add a device to the organization as a managed device via Microsoft Entra ID (formerly Azure Active Directory), possibly aiming to bypass conditional access policies set to restrict access to designated resources for managed devices exclusively.
In another incident, Microsoft was criticized for not addressing a security issue in Microsoft Teams that allowed bypassing restrictions for incoming files from external tenants using a tool named TeamsPhisher. APT29, known for orchestrating the SolarWinds supply-chain attack, has targeted various organizations with stealthy malware, including TrailBlazer and a variant of the GoldMax Linux backdoor.
Recently, Microsoft disclosed that the group is using new malware to control Active Directory Federation Services (ADFS) and infiltrate Windows systems as any user. APT29 has also targeted NATO countries’ Microsoft 365 accounts to gain access to foreign policy-related information. This hacking group has been behind phishing campaigns aimed at governments, embassies, and high-ranking officials in Europe. The impact of their social engineering attacks on government agencies highlights the severity of such threats even on well-protected entities.