Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Storm-2372 Exploits Device Code Phishing to Access Critical Systems
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Storm-2372 Exploits Device Code Phishing to Access Critical Systems

Highlights

  • Storm-2372 conducts device code phishing targeting critical infrastructure.

  • They exploit authentication tokens for unauthorized data access and movement.

  • Enhanced cybersecurity measures are essential to prevent future breaches.

Kaan Demirel
Last updated: 15 February, 2025 - 12:39 am 12:39 am
Kaan Demirel 3 months ago
Share
SHARE

A sophisticated cyber threat group, identified as Storm-2372, has been actively targeting critical infrastructure across multiple continents. Leveraging device code phishing techniques, the group has infiltrated organizations in sectors such as government, healthcare, and education. Their operations, which began in August 2024, demonstrate a high level of coordination and strategy aimed at compromising sensitive data and systems.

Contents
How Does Storm-2372 Conduct Its Phishing Attacks?What Impact Has This Had on Targeted Organizations?What Measures Are Being Taken to Mitigate These Threats?

Recent investigations reveal that Storm-2372’s methods are highly similar to previously reported attacks by other Russian-aligned groups. Unlike earlier incidents that focused primarily on financial sectors, Storm-2372 has broadened its targets to include a diverse range of industries. This expansion indicates a potential shift in the group’s objectives towards more strategic national and infrastructural targets.

How Does Storm-2372 Conduct Its Phishing Attacks?

Storm-2372 initiates phishing campaigns by sending messages through platforms like Microsoft Teams, WhatsApp, and Signal. They impersonate individuals of authority to establish trust before dispatching falsified Microsoft Teams meeting invitations. These invites contain device code authentication requests that, when entered by victims, grant attackers access to their accounts.

What Impact Has This Had on Targeted Organizations?

The breach of device code authentication allows Storm-2372 to capture valid tokens, facilitating lateral movement within compromised networks. This access enables the theft of sensitive data and escalates the potential damage to affected organizations. Microsoft reported that although the company itself was not directly impacted, the scope of the attacks remains significant and widespread.

What Measures Are Being Taken to Mitigate These Threats?

In response to the threat, Microsoft has released detailed research outlining the nature of the attacks and recommended security practices. Organizations are advised to enhance their authentication processes and educate employees about the risks of phishing attempts. Additionally, ongoing monitoring and threat intelligence efforts aim to detect and prevent further infiltration by Storm-2372.

“They’ve been successful in these attacks, though Microsoft itself is not affected,”

stated Sherrod DeGrippo, director of threat intelligence strategy at Microsoft. This highlights the persistent nature of the threat and the importance of robust cybersecurity measures.

To safeguard against such attacks, entities should implement multi-factor authentication and regularly update their security protocols. Understanding the tactics employed by Storm-2372 can aid organizations in reinforcing their defenses and minimizing vulnerabilities. Collaborative efforts between cybersecurity firms and affected organizations are essential in combating these sophisticated phishing strategies.

As device code phishing attacks become more prevalent, staying informed about emerging threats and adapting security measures accordingly is crucial. The ongoing vigilance by companies like Microsoft and Volexity plays a vital role in mitigating the risks posed by groups like Storm-2372. Effective response strategies will determine the resilience of organizations against such invasive cyber threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Avowed Balances Pillars of Eternity Legacy and Fresh Gameplay
Next Article Airbnb Aims to Transform Travel with AI and New Investments

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
Tesla’s Secretive Test Car Activities Ignite Curiosity
Electric Vehicle
AI Reshapes Global Workforce Dynamics
AI Technology
Nvidia Faces Price Uncertainty Despite Tariff Agreement
Computing
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?