<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Storm-2949 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/storm-2949/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 23:34:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/storm-2949/feed.xml" rel="self" type="application/rss+xml"/><item><title>Storm-2949 Abuses SSPR for Cloud-Wide Data Exfiltration</title><link>https://feed.craftedsignal.io/briefs/2026-05-storm-2949-cloud-breach/</link><pubDate>Mon, 18 May 2026 23:34:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-storm-2949-cloud-breach/</guid><description>Storm-2949 compromised cloud identities through social engineering and abused the Self-Service Password Reset (SSPR) process to bypass MFA and gain persistent access, enabling lateral movement and data exfiltration from Microsoft 365 and Azure environments.</description><content:encoded><![CDATA[<p>Storm-2949 conducted a multi-layered attack targeting cloud infrastructure by exploiting compromised identities rather than relying on traditional malware. Starting in May 2026, the actor targeted specific users through social engineering, abusing Microsoft&rsquo;s Self-Service Password Reset (SSPR) to bypass MFA and gain persistent access to Microsoft Entra ID. Once inside, they moved laterally through the victim&rsquo;s Microsoft 365 applications, file-hosting services, and Azure-hosted production environments, exfiltrating sensitive data. This campaign highlights the increasing focus of threat actors on cloud identities and control plane access, using legitimate administrative features for malicious purposes. The attack leveraged the Microsoft Graph API for directory discovery, enumerating users and applications within the tenant to identify high-value targets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access via Social Engineering:</strong> Storm-2949 initiates the SSPR process for targeted users, then uses social engineering (e.g., impersonating IT support) to trick them into approving MFA prompts.</li>
<li><strong>MFA Bypass:</strong> Once the user approves the prompts, the attacker resets the password and removes existing authentication methods (phone numbers, email addresses, Microsoft Authenticator registrations).</li>
<li><strong>Persistence via New MFA Enrollment:</strong> The attacker re-enables MFA and registers a new authentication method on their own device, granting themselves persistent access.</li>
<li><strong>Directory Discovery:</strong> Using compromised credentials, the attacker conducts directory discovery using Microsoft Graph API to enumerate users and applications within the tenant.</li>
<li><strong>Privilege Escalation:</strong> The attacker identifies privileged accounts to target for further compromise.</li>
<li><strong>Lateral Movement:</strong> Leveraging control-plane access, the actor moves laterally across cloud and endpoint environments.</li>
<li><strong>Access Cloud Resources:</strong> The attacker accesses sensitive cloud resources such as Key Vaults and storage accounts.</li>
<li><strong>Data Exfiltration:</strong> The actor exfiltrates sensitive data from Microsoft 365 applications, file-hosting services, and Azure-hosted production environments.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Storm-2949 campaign resulted in the exfiltration of sensitive data from multiple areas of the victim organization&rsquo;s cloud infrastructure, including Microsoft 365 applications and Azure-hosted environments. The attackers specifically targeted high-value assets, including those within SaaS, PaaS, and IaaS layers. The compromise of IT personnel and senior leadership suggests significant potential for widespread damage. The number of affected users and the total volume of exfiltrated data are not specified in the report.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement robust MFA policies and educate users about social engineering tactics targeting SSPR. Deploy the rule <code>Detect SSPR Abuse via Authentication Method Changes</code> to identify potential MFA bypass attempts.</li>
<li>Monitor Microsoft Graph API usage for unusual enumeration activities. Deploy the rule <code>Detect Microsoft Graph API Directory Enumeration</code> to identify suspicious user and application enumeration patterns.</li>
<li>Review and harden Azure role-based access control (RBAC) policies to limit lateral movement.</li>
<li>Implement behavior-based detections across endpoints, cloud environments, and identities, like those provided by Microsoft Defender XDR.</li>
<li>Regularly review and audit user accounts, especially those with elevated privileges, for any unauthorized changes to authentication methods or permissions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cloud-security</category><category>credential-access</category><category>data-exfiltration</category><category>social-engineering</category></item></channel></rss>