Thursday, August 28, 2025
HomeTechnologyStorm-0501 hackers shift to ransomware assaults within the cloud

Storm-0501 hackers shift to ransomware assaults within the cloud

Storm-0501 hackers shift to ransomware assaults within the cloud

Microsoft warns {that a} menace actor tracked as Storm-0501 has developed its operations, shifting away from encrypting units with ransomware to specializing in cloud-based encryption, information theft, and extortion.

The hackers now abuse native cloud options to exfiltrate information, wipe backups, and destroy storage accounts, thereby making use of stress and extorting victims with out deploying conventional ransomware encryption instruments.

Storm-0501 is a menace actor who has been energetic since at the very least 2021, deploying the Sabbath ransomware in assaults towards organizations worldwide. Over time, the menace actor joined numerous ransomware-as-a-service (RaaS) platforms, the place they used encryptors from Hive, BlackCat (ALPHV), Hunters Worldwide, LockBit, and, extra lately, Embargo ransomware.

In September 2024, Microsoft detailed how Storm-0501 prolonged its operations into hybrid cloud environments, pivoting from compromising Energetic Listing to Entra ID tenants. Throughout these assaults, the menace actors both created persistent backdoors by way of malicious federated domains or encrypted on-premises units utilizing ransomware, corresponding to Embargo.

A brand new report by Microsoft right now outlines a shift in ways, with Storm-0501 now not counting on on-premises encryption and as a substitute conducting assaults purely within the cloud.

“In contrast to conventional on-premises ransomware, the place the menace actor usually deploys malware to encrypt vital information throughout endpoints throughout the compromised community after which negotiates for a decryption key, cloud-based ransomware introduces a elementary shift,” reads the report by Microsoft Risk Intelligence.

“Leveraging cloud-native capabilities, Storm-0501 quickly exfiltrates giant volumes of knowledge, destroys information and backups throughout the sufferer atmosphere, and calls for ransom—all with out counting on conventional malware deployment.”

Cloud-based ransomware assaults

In latest assaults noticed by Microsoft, the hackers compromised a number of Energetic Listing domains and Entra tenants by exploiting gaps in Microsoft Defender deployments.

Storm-0501 then used stolen Listing Synchronization Accounts (DSAs) to enumerate customers, roles, and Azure assets with instruments corresponding to AzureHound. The attackers finally found a International Administrator account that lacked multifactor authentication, permitting them to reset its password and acquire full administrative management.

With these privileges, they established persistence by including malicious federated domains below their management, enabling them to impersonate nearly any person and bypass MFA protections within the area.

Microsoft says they escalated their entry additional into Azure by abusing the Microsoft.Authorization/elevateAccess/motion, which allowed them to finally assign themselves to Proprietor roles, successfully taking on the sufferer’s whole Azure atmosphere.

Overview of Storm-0501 cloud-based ransomware attack chain
Overview of Storm-0501 cloud-based ransomware assault chain
Supply: Microsoft

As soon as in command of the cloud atmosphere, Storm-0501 started disabling defenses and stealing delicate information from Azure Storage accounts. The menace actors additionally tried to destroy storage snapshots, restore factors, Restoration Providers vaults, and storage accounts to stop the goal from recovering information without spending a dime.

When the menace actor could not delete information from restoration providers, they utilized cloud-based encryption by creating new Key Vaults and customer-managed keys, successfully encrypting the information with new keys and making it inaccessible to the corporate except they pay a ransom.

After stealing information, destroying backups, or encrypting cloud information, Storm-0501 moved to the extortion part, contacting victims by way of Microsoft Groups utilizing compromised accounts to ship ransom calls for.

Microsoft’s report shares safety recommendation, Microsoft Defender XDR detections, and searching queries that may assist discover and detect the ways utilized by this menace actor.

As ransomware encryptors are more and more blocked earlier than they’ll encrypt units, we may even see different menace actors shift away from on-premise encryption to cloud-based information theft and encryption, which can be more durable to detect and block.

46% of environments had passwords cracked, practically doubling from 25% final yr.

Get the Picus Blue Report 2025 now for a complete take a look at extra findings on prevention, detection, and information exfiltration tendencies.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments