Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Netscaler adc and gateway exploiting Zero de Flaw, Citrix warns

    August 30, 2025

    I kept my grief away within a few seconds of these bone conduct headphones testing

    August 30, 2025

    10 Pocket – Acar tools that make life easier – and how do I use each

    August 30, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Storm -0501 Hackers Shifted for ransomware attacks in Cloud
    Security

    Storm -0501 Hackers Shifted for ransomware attacks in Cloud

    PineapplesUpdateBy PineapplesUpdateAugust 27, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Storm -0501 Hackers Shifted for ransomware attacks in Cloud
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Storm -0501 Hackers Shifted for ransomware attacks in Cloud

    Microsoft has warned that a danger actor tracked as Storm -0501 has developed his operation, which is away from encrypting devices with ransomware to focus on cloud -based encryption, data theft and extortion.

    Hackers now abuse the abuse of indigenous cloud features to exfiltrate data, wipe backup and destroy storage accounts, allowing traditional rangesware encryption tools to put pressure and to expel the victims without deploying the encryption tool.

    Storm -0501 is a danger an actor who is active since at least 2021, deploys Sabbath Rainmware in attacks against organizations worldwide. Over time, the danger actor joined various ranges-a-A-Services (RAAS) platforms, where he used encrypters from Hive, Blackcat (Alfav), Hunters International, Lockbit and, recently, Ambargo ranges.

    In September 2024, Microsoft explained in detail how Hurricane -0501 extended its operation into the hybrid cloud environment, from compromising active directory to entra ID tenants. During these attacks, the danger actors either created a continuous backdoor through malicious federal domains or encrypted the on-primesies device using ransomware such as ransomware.

    A new report of Microsoft underlines changes in the strategy today, in which Storm -0501 is no longer dependent on on -radius encryption and instead conducts purely attacks in the cloud.

    “Unlike traditional on-primeses ransomware, where the actor usually deploys malware to encryptuate important files in endpoints within the network within the network and then interactions for a decrying key, cloud-based ransomware introduces a fundamental change,” reported in the report. , Microsoft Danger Wisdom,

    “Storm -0501 eliminates large versions of rapid data, destroying data and backups within the environment, taking advantage of cloud -country abilities, and demands ransom without relying on traditional malware perfection.”

    Cloud-based ransomware attacks

    In recent attacks viewed by Microsoft, hackers tied up with several active directors domains and entra tenants by taking advantage of the interval in Microsoft Defenders Perinogen.

    Storm -0501 then used the stolen directory Synchronization Accounts (DSAS), with devices such as AzureHound to calculate users, roles and azure resources. The attackers eventually discovered a global administrator account, which led to a lack of multifarmer authentication, allowing him to reset his password and get complete administrative control.

    With these privileges, he established firmness by adding malicious federated domains under his control, making them able to bypass MFA security in almost any user and domain.

    Microsoft says that he carried forward his reach in Azure by misusing Microsoft.Authorization/Elevateaccess/Action, which finally allowed him to hand over themselves to the role of the owner, effectively to handle the entire azure environment of the suffering.

    Storm -0501 Cloud -based ransomware attack chain observation
    Storm -0501 Cloud -based ransomware attack chain observation
    Source: Microsoft

    Once under the control of the cloud environment, Hurricane -0501 began to disable the defense from the azure storage accounts and steal sensitive data. The danger actors attempted to destroy storage snapshots, restoration points, recovery services vaults and storage accounts to prevent the target from recovering data for free.

    When the actor could not remove the data from the actor recover services, he used cloud-based encryption by creating new key vaults and customer-related keys, effectively encrypted the data with the new key and made it inaccessible to the company until they pay ransom.

    After the theft of data stealing, destroying backups, or encrying cloud data, the storm -0501 contacted the victims through Microsoft teams using the compromised accounts to meet the ransom demands.

    Microsoft’s report shared safety advice, Microsoft defender XDR detection, and hunting questions that can help find and find out the strategy used by this danger actor.

    Since the ransomware encrypters are rapidly blocked before encrypting the device, we can transfer other danger actors to cloud-based data theft and encryption from on-primesies encryption, which can be difficult to detect and block.


    Picus Blue Report 2025

    The passwords broke in 46% of the atmosphere, almost doubled by 25% last year.

    Picus Blue Report 2025 Now get a wider look at more conclusions on prevention, detection and data exfIs.

    attacks cloud hackers Ransomware shifted Storm
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI still prefer Apple Watch on OURA ring for 3 major reasons – but there is a big drawback
    Next Article A16Z’s latest AI report says Google and Grok are holding chatgpt
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Netscaler adc and gateway exploiting Zero de Flaw, Citrix warns

    August 30, 2025
    Security

    Microsoft Windows Certificate Fixes Bug behind Nomination Errors

    August 30, 2025
    Security

    CISO succession crisis: Why companies do not have any plans and how to change it

    August 30, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Netscaler adc and gateway exploiting Zero de Flaw, Citrix warns

    August 30, 2025

    I kept my grief away within a few seconds of these bone conduct headphones testing

    August 30, 2025

    10 Pocket – Acar tools that make life easier – and how do I use each

    August 30, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.