Microsoft Security’s cover photo
Microsoft Security

Microsoft Security

IT Services and IT Consulting

Empowering security leaders with innovation, insights, and tools to stay ahead of threats

About us

Leading source for security innovation, industry insights, and news. Stay ahead of every shift in the security landscape and discover tools to help you secure your organization.

Website
www.microsoft.com/security
Industry
IT Services and IT Consulting
Company size
10,001+ employees
Headquarters
Seattle
Specialties
Security, Information protection, Identity, Compliance, Zero Trust, Remote Work, Threat protection, Access management, Microsoft Azure, Microsoft 365, Cloud app security, Secure application development, MCAS, CASB, Cloud access, Machine learning, and Cybersecurity

Updates

  • On Thanksgiving eve, Microsoft detected and disrupted a sophisticated phishing campaign from Storm-0900 targeting tens of thousands of U.S. users. The attack used timely themes—parking tickets, medical results, holiday references—to exploit trust and urgency. Check out the post below to explore: ➡️ What made this campaign notable ➡️ The business impact ➡️ What protected our customers ➡️ Recommended actions for organizations #ThreatIntelligence

    On Thanksgiving eve, November 26, Microsoft detected and blocked a high-volume phishing campaign from a threat actor we track as Storm-0900. The campaign used parking ticket and medical test result themes and referenced Thanksgiving to lend credibility and lower recipients’ suspicion. The campaign consisted of tens of thousands of emails and targeted primarily users in the United States. Microsoft disrupted this campaign through a combination of email filtering, endpoint protections, and threat intelligence-based preemptive blocking of attacker infrastructure. The URLs in the phishing emails redirected to an attacker-controlled landing page on the malicious domain permit-service[.]top that employed several rounds of user interaction. First, users needed to solve a slider CAPTCHA by clicking and dragging a slider, followed by ClickFix, a technique that threat actors use to trick users into running malicious commands on their devices. If users fell for the ClickFix lure and executed a command in their Run prompt, a PowerShell script would run. Like similar Storm-0900 activity, this campaign led to XWorm, a popular modular malware used by many threat actors for remote access, deployment of other malware, and data theft. XWorm uses plugins that threat actors can use to perform various tasks on compromised devices. These plugins have evolved over the years. While we have not observed it being used in attacks, the latest XWorm version includes a plugin for encrypting files, giving the malware ransomware capability. Storm-0900 is a prolific threat actor that, when active, launches phishing campaigns every week. The actor abuses many popular brands in their emails. This specific campaign, along with the parking ticket and medical test result themed emails, also utilized emails purporting to be from a health care company and a government health agency. Microsoft recommends continuously raising awareness of phishing campaigns, including attack simulation training, among users. In addition to blocking the phishing emails through email filtering and preemptive blocking of infrastructure, Microsoft Defender detects the XWorm malware, malicious connections, and follow-on malicious behavior. This campaign underscores the importance of early detection and blocking of malicious activity in disrupting multi-stage attacks and stopping threat actors from performing follow-on actions.

    • Screenshot of emails used by Storm-0900 in phishing campaign
    • Screenshot of landing page showing a slider CAPTCHA
    • Screenshot of instructions to run a command, a technique called ClickFix
  • Microsoft Security reposted this

    View profile for Vasu Jakkal
    Vasu Jakkal Vasu Jakkal is an Influencer

    CVP Microsoft Security | Board of Directors, Aptiv

    Last month at #MSIgnite, we announced a series of new advancements to help organizations embrace agentic AI for security operations, and ensure the agents they deploy are safe, reliable, and secure.   As Charlie Bell shares in the video below, Agentic AI is creating new avenues for defenders to manage the increasing volume and complexity of the modern threat landscape. Specialized agents can unlock new levels of efficiency in tackling these threats, but to truly realize this potential, it’s essential that these agents are managed responsibly and effectively!

  • Ready to secure and govern your AI with confidence? This is the last week to join the Microsoft Security Learning Challenge before it closes. Join the challenge to gain: ✅ Hands-on experience with Microsoft security solutions ✅ Practical knowledge to strengthen your organization’s defenses ✅ Marketable skills to better yourself and your career Plus, you could join these leaders at the top of the challenge leaderboard. Start today—link in comments.

  • The future of AI security is ambient and autonomous. Learn why in the latest edition of Security Pulse. You’ll discover: 1️⃣ New security agents to empower your team. 2️⃣ Vasu Jakkal’s insights for securing your AI.  3️⃣ How Best Buy reduced alert resolution time by 20%. Don’t miss a beat—subscribe to get updates tailored for CISOs.  

  • Microsoft Security reposted this

    View profile for Jarred B.

    Sr. Product Marketing Manager @ Microsoft | Identity Security

    Excited to share that we’ve launched Synced Passkeys in Microsoft Entra ID, added granular admin controls for passkeys, and improved self-service account recovery—delivering faster sign-ins and a smoother recovery experience. Want to see it in action? Check out our new Microsoft Mechanics video for a quick demo of passkey registration, admin controls, and high-assurance recovery options. Watch here: https://lnkd.in/g_vTRs35 I’d love to hear what you think! Microsoft Security

Affiliated pages

Similar pages