MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$67,590.000.44%
  • ethereumEthereum(ETH)$1,957.34-0.05%
  • tetherTether(USDT)$1.000.00%
  • rippleXRP(XRP)$1.430.81%
  • binancecoinBNB(BNB)$625.072.78%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$84.441.60%
  • tronTRON(TRX)$0.2846310.49%
  • dogecoinDogecoin(DOGE)$0.0997960.76%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.040.64%
Blockchain

Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories

Last updated: October 24, 2025 1:40 pm
Published: 4 months ago
Share

Cybersecurity researchers have identified a sophisticated campaign where threat actors are leveraging compromised credentials to infiltrate Azure Blob Storage containers, targeting organizations’ critical code repositories and sensitive data.

This emerging threat exploits misconfigured storage access controls to establish persistence and exfiltrate valuable intellectual property.

The attack vector represents a significant shift in how threat actors are approaching cloud infrastructure, moving beyond traditional endpoint-focused attacks toward enterprise storage systems.

The campaign has been linked to multiple threat groups operating across different sectors, including finance, technology, and critical infrastructure.

Microsoft analysts noted that the attacks typically begin with credential harvesting through phishing campaigns and malware-based information stealers.

Once initial access is established, operators conduct reconnaissance to identify accessible Azure Blob Storage instances with weak or default access policies.

The threat actors then systematically enumerate containers to locate valuable repositories, configuration files, and backup data.

Microsoft researchers identified a critical component of this operation involving SharkStealer, a Golang-based infostealer that employs an advanced communication technique called EtherHiding to evade traditional detection mechanisms.

This malware family utilizes the BNB Smart Chain Testnet as a command-and-control dead-drop, retrieving encrypted command instructions through smart contract calls rather than direct domain-based communications.

The sophistication of these operations lies in how threat actors combine traditional credential theft with blockchain-based obfuscation techniques. SharkStealer initiates contact with BNB Smart Chain nodes using Ethereum JSON-RPC calls targeting specific smart contracts.

The malware executes eth_call requests to predetermined contract addresses, receiving tuples containing an initialization vector and encrypted payload.

Using a hardcoded AES-CFB encryption key embedded within the binary, the malware decrypts the returned data to extract current C2 server coordinates.

This methodology creates significant detection challenges because network traffic analysis reveals only legitimate blockchain node communications, making it extremely difficult to distinguish malicious activity from benign cryptocurrency wallet interactions.

The use of public blockchain infrastructure as a dead-drop mechanism provides threat actors with remarkable resilience against traditional takedown operations and domain blocking strategies.

In observed campaigns, once SharkStealer compromises a system, it harvests Azure credentials stored in browser caches, configuration files, and credential managers.

These stolen credentials grant direct access to Azure Blob Storage containers without triggering standard access controls.

Threat actors then establish secondary connections to Azure Storage, downloading entire repositories containing source code, API keys, and sensitive configuration data.

The combination of EtherHiding-based command infrastructure with Azure Storage access creates a particularly dangerous threat profile that organizations must actively defend against through credential rotation, access reviews, and monitoring for anomalous blockchain-based communications originating from internal networks.

Organizations should implement strict Azure Storage authentication policies, enforce multi-factor authentication on administrative accounts, and deploy behavioral monitoring to detect unusual API access patterns.

Read more on Cyber Security News

This news is powered by Cyber Security News Cyber Security News

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

Chintai and Maluku Archipelago Joint Venture Unveil one of the World’s Largest Regulated Nature-Based Asset Tokenization Projects
Mirai School of Technology Is Changing Engineering in India – Here?s How Students Are Learning AI fr
Computing and Gaming Winners 2023 – News Directory 3
Uniswap Flips Fee Switch, Burns 100M UNI After Vote – Crypto Economy
Hyperliquid (HYPE) Chart Patterns Point to Potential Upside Targets

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article CBA chairman: Digital currencies should develop within a regulatory framework
Next Article Pieverse Secures $7 Million in Strategic Funding Round Led by Animoca Brands and UOB Ventures – Decrypt
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d