Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»UK secretly tie Grow with Microsoft 365 Credit-Seconding Malware
    Security

    UK secretly tie Grow with Microsoft 365 Credit-Seconding Malware

    PineapplesUpdateBy PineapplesUpdateJuly 20, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    UK secretly tie Grow with Microsoft 365 Credit-Seconding Malware
    Share
    Facebook Twitter LinkedIn Pinterest Email

    UK secretly tie Grow with Microsoft 365 Credit-Seconding Malware

    The UK National Cyber Security Center (NCSC) has formally blamed ‘Authentic Antics’ detective malware attacks for APT28 (fancy bear), a threat that is already associated with Russia’s military intelligence service (GRU).

    The NCSC on 6 May revealed in a detailed technical analysis of authentic anteics malware that it is stealing credentials and OAuth 2.0 tokens that allow access to the target email account.

    The malware was seen in 2023 and runs inside the outlook process and produces several microsoft login signals in its efforts to intercept the victim’s sign-in data and authority code.

    The agency says that because Microsoft 365 apps are configured per tenant per tenant, it is possible that sensitive data also works for online exchange, sharepoint and ONEDRIVE.

    The authentic anteics hide the operation by disabled to send the stolen data to an attacker-controlled email address using the victim’s own outlook account, and the “Save to be sent” option.

    Fake login prompt served for target
    Fake login prompt served for target
    Source: NCSC

    Authentic antics consist of many components including a dropper, a infoseller, and several powerrashel scripts.

    The UK Cyber Agency says that authentic antics have a high level of sophistication that allows it to provide access to the suffering email accounts for a long time without detecting it.

    This is possible because the network communication of malware is only with legitimate services. In addition, since it automatically sends the victim’s email messages to the attacker, he does not require command-end control (C2) server to achieve tasks.

    “Its presence on the disc is limited, data outlook stored in specific registry locations,” NCSC experts have said in technical. Analysis,

    Attention and restriction

    The NCSC created any attention for authentic antics, but the agency today announced that it found evidence that the malware was linked to the APT28 State Group, which is also known as fancy bears, sednets, sofesi, pon stars, Storm, Strontium, TSAR team and Forest Blogs.

    “The government today (July 18) has exposed Russian military intelligence actors to use unknown malicious software to enable espionage against the afflicted email accounts, in a move that will protect the UK and its colleagues,” NCSC says,

    “The National Cyber Security Center – a part of the GCHQ – has revealed for the first time that Cyber Threat Group APT 28 is responsible for deploying a sophisticated malware dubged authentic antics as part of its operation.”

    This attention has also done Government of UK approves three GRU units (26165, 29155, and 74455) and 18 Russian persons These and other related campaigns include.

    UK officials condemned the GRU agents to volatile Europe and to endanize British citizens, also said that the deployment of authentic antics reflects the increasing refinement for Russian intelligence service.

    At the same time, he outlined the NCSC’s commitment to highlight these cyber activities and approve responsible parties.

    Authentic antics have been used in attacks


    Knowledgeable

    CISOS knows how to purchase a board begins with a clear, strategic approach how the cloud safety runs the business price.

    This helps to introduce the risk, impact and priorities to the free, editable board report deck deck security leaders in clear business terms. Convert security updates into meaningful conversations and take fast decision in boardroom.

    CreditSeconding Grow Malware Microsoft secretly tie
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleStudies show that this type of exercise reduces your biological age by 9 years.
    Next Article I have just tested these incredible stereo speakers – and they are better than any soundbar I have ever tested.
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How a simple link allowed hackers to bypass Copilot’s security guardrails – and what Microsoft did about it

    January 19, 2026
    Startups

    Free Webinar February 3: How to use press and PR to grow fast without a big budget

    January 14, 2026
    Startups

    No, Microsoft Office hasn’t been renamed Microsoft 365 Copilot – that’s why you’re confused

    January 6, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.