Categories: Trending now

Microsoft warns of gift card fraud, shares tactics of one of the world’s most dangerous hacker group Storm-0539

2024-06-01 06:44:36

Cybercriminals are constantly innovating, and gift cards have become a new battleground. Microsoft Threat Intelligence report warns that gift cards are an attractive target due to the lack of personal information attached to them, making them ideal for fraud and social engineering schemes.
The report highlights a specific threat actor group, Storm-0539 (also known as Atlas Lion), which has been particularly active around major US holidays.In the lead-up to Memorial Day 2024, Microsoft observed a 30% increase in activity from this group, suggesting a potential surge in attacks during peak shopping seasons.

Storm-0539: How the hacker group’s tactics have evolved

This cybercrime group has been active since late 2021 and demonstrates a concerning evolution. Previously focused on compromising point-of-sale systems to steal credit card data, they’ve shifted to targeting cloud and identity services. The aim is to infiltrate the payment systems of large retailers, luxury brands, and fast food restaurants to steal or manipulate gift cards.
What makes Storm-0539 particularly dangerous is their sophisticated approach. They exploit their deep understanding of cloud environments to scout out organizations’ gift card systems and employee access points. Their methods mirror those of nation-state attackers, granting them persistent access to create and steal gift cards for illicit purposes.
How Storm-0539 escapes detection
To avoid detection, Storm-0539 utilizes deceptive tactics. They pose as legitimate organizations, acquiring cloud resources under the guise of non-profits. They even create fake websites with misleading domain names to lure unsuspecting victims.
What internet and smartphone users can do to protect themselves
For organizations issuing gift cards, vigilance is key. Treat gift card portals as high-value targets and implement continuous monitoring for suspicious activity. Multi-factor authentication and strong access controls are crucial to hinder these attackers. Additionally, investing in cloud security best practices and educating staff on social engineering tactics are essential lines of defense.

AD
News Today

Recent Posts

Here’s how far mortgage rates have dropped already this year

2024-09-20 08:15:03 Mortgage rates are a lot lower today than they were at the start…

7 mins ago

Adoption fraud separated generations of South Korean children from their families, AP finds

SEOUL, South Korea -- South Korea’s government, Western countries and adoption agencies worked in tandem…

12 mins ago

Quién fue Emerson Romero, el cineasta que honra Google con un Doodle este 19 de septiembre

2024-09-20 08:05:03 Durante el Mes de la Herencia Hispana, Google ha decidido utilizar sus Doodle…

17 mins ago

State Department opens online passport renewal service to full public

2024-09-20 07:55:03 The days where the only option to renew your passport was mailing the…

27 mins ago

Dow, S&P 500 close at record highs, Nasdaq surges amid rate cut euphoria

2024-09-20 07:45:02 US stocks soared, with the Dow Jones Industrial Average (^DJI) closing above the…

37 mins ago