Comprehensive Threat Exposure Management Platform
A widespread campaign is actively targeting Microsoft Azure Blob Storage, exploiting misconfigured or publicly exposed Blob accounts, leaked credentials, and insecure automation triggers across Azure Functions and Logic Apps.
Attackers are leveraging Blob Storage vulnerabilities to gain initial access, establish persistence, and perform data discovery, exfiltration, and ransomware deployment. Azure Blob Storage, a core component for storing unstructured data such as backups, analytics datasets, and AI models, has become a prime entry point due to its frequent misconfigurations and high-value contents.
Once compromised, threat actors repurpose Blob Storage for command-and-control (C2) operations, malware distribution, and data staging, resulting in large-scale data theft, corruption, and financial loss. The observed tactics align with both financially motivated and espionage-driven threat actors, affecting organizations globally across cloud-native environments.
The campaign underscores how poorly secured cloud storage can expose enterprises to severe compromise.
This ongoing wave of cloud-centric intrusions highlights the need for strong identity management, network segmentation, and continuous monitoring across Azure workloads.
These proactive configurations drastically reduce the risk of compromise, making Azure Blob Storage more resilient to exploitation attempts.
| Tactic | Technique | ID |
|---|---|---|
| Initial Access | Exploit Public-Facing Application | T1190 |
| Execution | Command and Scripting Interpreter | T1059 |
| Persistence | Valid Accounts, Account Manipulation | T1078, T1098 |
| Privilege Escalation | Additional Cloud Credentials | T1098.001 |
| Defense Evasion | Spoof Security Alerting, Impair Defenses | T1562.011, T1562 |
| Credential Access | Steal Application Access Token, OS Credential Dumping | T1528, T1003 |
| Discovery | Cloud Infrastructure Discovery, Network Sniffing | T1580, T1040 |
| Lateral Movement | Remote Services – Cloud Services | T1021.007 |
| Collection | Data from Cloud Storage | T1530 |
| Exfiltration | Exfiltration Over Web Service, Transfer Data to Cloud Account | T1567, T1537 |
| Impact | Data Destruction, Data Encrypted for Impact | T1485, T1486 |
| Command & Control | Application Layer Protocol (Web Protocols) | T1071.001 |
| Reconnaissance | Search Open Websites/Domains, Cloud Service Discovery | T1593, T1526 |
| Resource Development | Acquire Infrastructure, Cloud Accounts | T1583, T1078.004 |
Get through updates and upcoming events, and more directly in your inbox