Originally reported by BleepingComputer
TL;DR
Threat actors are abusing Microsoft Azure Monitor's legitimate alert system to send callback phishing emails that impersonate Microsoft Security Team notifications about unauthorized account charges. The campaign leverages Azure's trusted infrastructure to bypass email security filters and increase victim trust.
Active phishing campaign targeting Azure users with sophisticated abuse of legitimate Microsoft services, but requires user interaction and social engineering to succeed.
Threat actors have developed a sophisticated callback phishing campaign that exploits Microsoft Azure Monitor's legitimate alert functionality to send deceptive emails impersonating the Microsoft Security Team, according to research from BleepingComputer.
The attackers craft alerts within Azure Monitor that generate automated email notifications warning recipients about purported unauthorized charges on their Microsoft accounts. These emails leverage Azure's trusted sending infrastructure to bypass email security filters and appear authentic to recipients.
The campaign follows a multi-stage approach:
Attackers first gain access to Azure subscriptions through various methods, potentially including:
Once inside an Azure environment, threat actors configure Monitor alerts with carefully crafted messages that:
When recipients call the provided numbers, attackers attempt to:
This campaign demonstrates several concerning developments in phishing tactics:
Infrastructure Abuse: Attackers are increasingly leveraging legitimate cloud services to conduct malicious activities, making detection and attribution more challenging.
Trust Exploitation: By using Azure's official notification system, the emails carry inherent credibility that traditional phishing emails lack.
Filter Evasion: Messages originating from legitimate Microsoft infrastructure are likely to bypass many email security solutions.
This campaign represents an evolution in callback phishing techniques, moving beyond traditional email spoofing to abuse cloud infrastructure directly. The approach highlights the ongoing challenge of securing cloud environments against insider threats and the importance of comprehensive monitoring across all cloud services.
Security teams should particularly focus on monitoring administrative activities within Azure subscriptions and implementing robust change management processes for alert configurations.
Originally reported by BleepingComputer