• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    7-Eleven data breach

    7-Eleven Confirms Hack After Appearing on ShinyHunters Leak List

    Storm-2949

    Microsoft Details Storm-2949 Cloud Attack on Azure and Microsoft 365

    Operation Ramz

    INTERPOL Busts Massive Cybercrime Network Across MENA, 201 Arrested

    Viral Energy Drink Videos

    Dubai Police Warns Against Viral Energy Drink Videos Targeting Children on Social Media

    Agentic AI Deployment

    NCSC Calls for Tight Security and Human Oversight as Agentic AI Use Expands

    Shadow AI Is Growing in Silence

    Shadow AI Is Growing in Silence While Enterprise Security Falls Behind

    TCE weekly roundup TCE

    The Cyber Express Weekly Roundup: AI Threat Escalation, Ransomware Disruption, Supply Chain Attacks, and Expanding Cybersecurity Risks

    Fragnesia

    Fragnesia Linux Kernel Flaw Enables Root Privilege Escalation

    node-ipc, npm package

    Malicious node-ipc npm Packages Trigger New Supply Chain Security Alarm

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Viral Energy Drink Videos

    Dubai Police Warns Against Viral Energy Drink Videos Targeting Children on Social Media

    Agentic AI Deployment

    NCSC Calls for Tight Security and Human Oversight as Agentic AI Use Expands

    Shadow AI Is Growing in Silence

    Shadow AI Is Growing in Silence While Enterprise Security Falls Behind

    EU Surveillance Technology

    EU Faces Criticism Over Surveillance Technology Exports to Rights Violators

    National Technology Day 2026

    National Technology Day 2026: India’s AI Growth Puts Security in Focus

    California Privacy Settlement

    California Hits General Motors With Record $12.75 Million CCPA Privacy Settlement

    Online Safety Act

    Fake Moustache Trick Raises Questions Over UK Online Safety Act Age Checks

    Claude AI, Antropic, AI, Artificial Intelligence

    U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

    U.S. Government Sues TikTok, TikTok

    UK’s Online Age Checks Are Failing—Kids are Beating Them with AI, Fake Beards

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    7-Eleven data breach

    7-Eleven Confirms Hack After Appearing on ShinyHunters Leak List

    Storm-2949

    Microsoft Details Storm-2949 Cloud Attack on Azure and Microsoft 365

    Operation Ramz

    INTERPOL Busts Massive Cybercrime Network Across MENA, 201 Arrested

    Viral Energy Drink Videos

    Dubai Police Warns Against Viral Energy Drink Videos Targeting Children on Social Media

    Agentic AI Deployment

    NCSC Calls for Tight Security and Human Oversight as Agentic AI Use Expands

    Shadow AI Is Growing in Silence

    Shadow AI Is Growing in Silence While Enterprise Security Falls Behind

    TCE weekly roundup TCE

    The Cyber Express Weekly Roundup: AI Threat Escalation, Ransomware Disruption, Supply Chain Attacks, and Expanding Cybersecurity Risks

    Fragnesia

    Fragnesia Linux Kernel Flaw Enables Root Privilege Escalation

    node-ipc, npm package

    Malicious node-ipc npm Packages Trigger New Supply Chain Security Alarm

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Viral Energy Drink Videos

    Dubai Police Warns Against Viral Energy Drink Videos Targeting Children on Social Media

    Agentic AI Deployment

    NCSC Calls for Tight Security and Human Oversight as Agentic AI Use Expands

    Shadow AI Is Growing in Silence

    Shadow AI Is Growing in Silence While Enterprise Security Falls Behind

    EU Surveillance Technology

    EU Faces Criticism Over Surveillance Technology Exports to Rights Violators

    National Technology Day 2026

    National Technology Day 2026: India’s AI Growth Puts Security in Focus

    California Privacy Settlement

    California Hits General Motors With Record $12.75 Million CCPA Privacy Settlement

    Online Safety Act

    Fake Moustache Trick Raises Questions Over UK Online Safety Act Age Checks

    Claude AI, Antropic, AI, Artificial Intelligence

    U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

    U.S. Government Sues TikTok, TikTok

    UK’s Online Age Checks Are Failing—Kids are Beating Them with AI, Fake Beards

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Microsoft Details Storm-2949 Cloud Attack on Azure and Microsoft 365

Ashish Khaitan by Ashish Khaitan
May 19, 2026
in Firewall Daily, Cyber News
0
Storm-2949
590
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter

Microsoft Threat Intelligence has disclosed details of a cyberattack carried out by a threat actor tracked as Storm-2949, which escalated from a targeted identity compromise into a large-scale breach of cloud infrastructure and sensitive enterprise systems. The campaign focused heavily on data theft from Microsoft 365 services, Azure-hosted production environments, and cloud storage resources, demonstrating how compromised identities can become gateways to an organization’s entire cloud ecosystem.

According to Microsoft, the attack unfolded in two primary stages: an initial identity compromise phase followed by a broader cloud infrastructure takeover. Rather than deploying traditional malware or relying on conventional on-premises attack methods, the attackers abused legitimate cloud administration tools and Azure management features to blend into normal activity while gaining access to high-value systems. 

Attackers Abused MFA Reset Processes to Hijack High-Privilege Accounts 

The attackers first targeted employees through social engineering techniques linked to Microsoft’s Self-Service Password Reset (SSPR) process. Investigators believe Storm-2949 impersonated internal IT support personnel and persuaded victims to approve multifactor authentication (MFA) requests under the guise of routine account verification or password reset procedures. 

Once a targeted user applies the MFA prompts, the attackers reset account passwords and remove existing authentication methods, including phone numbers, email addresses, and Microsoft Authenticator registrations. This effectively neutralized MFA protections and locked legitimate users out of their accounts. The attackers then registered their own devices for Microsoft Authenticator access, ensuring persistent control over the compromised accounts. 

Microsoft said the group repeated this process against multiple employees, including IT staff and senior leadership personnel, indicating deliberate targeting of users with elevated access privileges. 

After gaining access, Storm-2949 began conducting directory discovery operations using Microsoft Graph API queries executed through a custom Python script. The attackers enumerated users, applications, and service principals within the Microsoft Entra ID tenant to identify privileged accounts and map potential paths for expanding access. 

report-ad-banner

The attackers also attempted to establish persistence by adding credentials to a compromised service principal, though this effort reportedly failed because of insufficient permissions. Despite that setback, they continued probing service principals and application identifiers to identify additional long-term access opportunities. 

The campaign quickly expanded into Microsoft 365 services such as OneDrive and SharePoint. Microsoft said the attackers focused particularly on sensitive IT-related documents involving VPN configurations and remote access procedures, suggesting they were searching for methods to move laterally into other environments. 

In one instance, Storm-2949 used the OneDrive web interface to download thousands of files in a single operation. Similar exfiltration activity occurred across multiple compromised accounts, likely because each user account had access to different shared folders and repositories. 

Azure Key Vaults, SQL Servers, and Storage Accounts Became Primary Targets 

With several compromised identities under their control, the attackers shifted attention to Azure subscriptions connected to the organization’s production environment. The accounts they compromised reportedly possessed privileged custom Azure role-based access control (RBAC) permissions, enabling broader access to Azure services and infrastructure. 

Microsoft said the attackers targeted Azure App Services, Key Vaults, Storage accounts, SQL databases, and virtual machines. One of their key objectives involved compromising a production Azure App Service web application that contained sensitive data. 

After several failed attempts to directly access the primary application due to network and gateway restrictions, the attackers pivoted to secondary applications within the same ecosystem, including authentication services and internal APIs. Using privileged Azure RBAC permissions, they exploited the “microsoft.Web/sites/publishxml/action” management-plane operation to retrieve publishing profiles containing deployment credentials for services such as FTP, Web Deploy, and the Kudu management console. 

Kudu, an administrative interface for Azure App Services, enabled the attackers to inspect environment variables, browse application files, and execute commands within compromised applications. However, Microsoft noted that the secondary services did not provide the level of access or sensitive information the attackers ultimately sought. 

Storm-2949 then redirected its efforts toward Azure Key Vault resources. One compromised account held the Owner role over a Key Vault believed to contain credentials linked to the primary production application. Within a four-minute period, the attackers altered Key Vault access settings and accessed dozens of secrets, including database connection strings and identity credentials. 

Microsoft believes these secrets ultimately enabled access to the main production web application. After authenticating successfully, the attackers changed the application password to maintain control and began exfiltrating sensitive data. 

The campaign also involved attacks against Azure SQL servers and Storage accounts. To gain access to SQL infrastructure, the attackers modified firewall rules through the “microsoft.sql/servers/firewallrules/write” operation, then connected using credentials retrieved from the compromised Key Vault. Once data exfiltration was completed, the altered firewall rules were deleted in what Microsoft described as a defense-evasion tactic. 

Similarly, the attackers manipulated Azure Storage account network access configurations through the “microsoft.storage/storageaccounts/write” operation, enabling public access from attacker-controlled IP addresses. They also used the “microsoft.Storage/storageAccounts/listkeys/action” operation to retrieve storage account keys and Shared Access Signature (SAS) tokens. 

Using a custom Python script built on the Azure Storage SDK, Storm-2949 downloaded large volumes of data directly from Azure Storage accounts over several days. Microsoft said the attackers alternated between OAuth-based authentication and secret-based authentication methods as defensive controls evolved. 

Microsoft Says Cloud Management Features Were Weaponized for Stealthy Data Exfiltration 

Virtual machines also became a target. The attackers abused Azure VM extensions, including VMAccess and Run Command, to establish administrator-level access on compromised systems. By deploying the VMAccess extension, they created new local administrator accounts on targeted VMs. 

The attackers also attempted to exploit managed identities assigned to virtual machines by requesting access tokens from the Azure Instance Metadata Service (IMDS). They then tried using those tokens to access production-related Key Vaults, though Microsoft said these attempts failed because the managed identities lacked sufficient permissions. 

Additional Run Command activity involved deploying PowerShell scripts designed to disable Microsoft Defender Antivirus protections, including real-time monitoring and behavior-based detection. The scripts also attempted to interfere with security services, clear Windows event logs, erase command histories, and remove temporary files to reduce forensic visibility. 

Microsoft said the attackers installed ScreenConnect remote management software from infrastructure under their control and disguised the installation to resemble legitimate Windows software updates. The malicious service was renamed to mimic authentic Windows components in an effort to avoid detection. 

The attackers later used ScreenConnect to perform reconnaissance activities across compromised systems, including collecting host configuration data, enumerating users and groups, searching for exposed credentials, and exfiltrating .pfx certificate files that may have contained private keys useful for future access. 

Despite extensive activity on endpoint systems, investigators found limited evidence that Storm-2949 successfully obtained high-value endpoint data. Microsoft said the endpoint compromises primarily served operational purposes such as credential harvesting, reconnaissance, and expanding access throughout the victim’s environment. 

Throughout the intrusion, Microsoft Defender generated multiple alerts that enabled analysts to correlate cloud, identity, and endpoint telemetry into a unified investigation. Microsoft said the incident demonstrates the growing importance of integrated detection and response capabilities as attackers target cloud identities and management planes instead of relying solely on traditional endpoint-focused attacks. 

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: AzuremfaMicrosoft 365Storm-2949The Cyber ExpressThe Cyber Express News
Previous Post

INTERPOL Busts Massive Cybercrime Network Across MENA, 201 Arrested

Next Post

7-Eleven Confirms Hack After Appearing on ShinyHunters Leak List

Next Post
7-Eleven data breach

7-Eleven Confirms Hack After Appearing on ShinyHunters Leak List

Upcoming Webinar

Sectoral Threat Reports

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

7-Eleven data breach
Cyber News

7-Eleven Confirms Hack After Appearing on ShinyHunters Leak List

May 19, 2026
Storm-2949
Firewall Daily

Microsoft Details Storm-2949 Cloud Attack on Azure and Microsoft 365

May 19, 2026
Operation Ramz
Cyber News

INTERPOL Busts Massive Cybercrime Network Across MENA, 201 Arrested

May 19, 2026
Viral Energy Drink Videos
Cyber Essentials

Dubai Police Warns Against Viral Energy Drink Videos Targeting Children on Social Media

May 18, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information