Microsoft has revealed details of the Storm-1977 cyber group’s attacks on education sector cloud systems. The hackers used a “password spraying” method – a mass login attempt using popular password combinations to gain access to accounts.
The main tool used in the attacks was AzureChecker.exe, a program that allowed the attackers to find vulnerable Microsoft Azure cloud resources. After hacking the accounts, the hackers created more than 200 virtual containers for cryptocurrency mining. Cryptojacking is the hidden installation of cryptocurrency mining programs on other people’s devices, which slows them down and increases their electricity bills.
The attacks began last year and mostly affected US educational institutions, where cloud technology is widely used for data storage and teaching. The hackers also took over guest accounts, allowing them to remain undetected. Microsoft has already strengthened security measures, including two-factor authentication, and is urging institutions to update passwords and monitor for suspicious activity.
B2 received modules for work in extreme conditions Unitree has unveiled a modified version of its B2 robot dog that can fight fires. The new model is equipped with special…
Microsoft Addresses Recent Windows 11 Update Glitches with KB5062170 Microsoft has released an emergency update, KB5062170 (builds 22621.5415 and 22631.5415), for Windows 11 versions 22H2 and 23H2. The patch addresses…
Too general a concept Tesla has been denied a trademark for its cars called Robotaxi, Engadget reports. The U.S. Patent and Trademark Office (USPTO) found the term too broad because…
The issue affects PCs, laptops and servers Scientists in Switzerland have discovered a new vulnerability in Intel processors related to the command prediction function. This technology allows computers to speed…
Reviving the GTX 970 Enabling Full 8GB VRAM for Enhanced Performance When it launched, the Nvidia GeForce GTX 970 was a strong mid-range option, delivering performance close to AMD’s Radeon…
LG’s 34-inch UltraGear OLED gaming monitor is now available for an all-time low price If you’re looking to upgrade your gaming setup with a high-end OLED display, now might be…
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.