Skip to main content

Notifications

Announcements

No record found.

Identify Threat Actors that Use Azure Storage Tools to Ransom Sensitive Data

The blog post “Highway Blobbery: Data Theft Using Azure Storage Explorer” (ModePush, 2024) highlights how threat actors exploit legitimate tools like Azure Storage Explorer and AzCopy for data exfiltration. Attackers leverage these tools to transfer large datasets from compromised environments, often bypassing traditional detection methods. Understanding Azure Storage Explorer and AzCopy Azure Storage Explorer is… Continue reading Identify Threat Actors that Use Azure Storage Tools to Ransom Sensitive Data

The post Identify Threat Actors that Use Azure Storage Tools to Ransom Sensitive Data appeared first on ArcherPoint.


This was originally posted here.

Comments

*This post is locked for comments