Storm-0501 Moves to Cloud-Based Extortion Without Malware

Microsoft warns that the threat actor is now leveraging cloud-native tools to steal, encrypt, and destroy data, sidestepping traditional ransomware payloads entirely.

CSBadmin
2 Min Read

Seasoned ransomware threat actor Storm-0501, previously linked to variants like Sabbath, Embargo, Hive, and LockBit, has shifted tactics once again—this time abandoning on-premise ransomware deployments in favor of cloud-centric extortion operations. Microsoft’s latest threat intelligence report outlines how the group now weaponizes built-in cloud tools to execute its attacks, marking a significant evolution in ransomware methodology.

Rather than deploying malware to encrypt local devices, Storm-0501 infiltrates cloud environments by exploiting weak points in Microsoft Defender configurations and mismanaged identity protections. In recent cases, the group compromised Active Directory and Entra ID tenants, used stolen Directory Synchronization Accounts to enumerate Azure resources, and escalated privileges by abusing Azure’s own elevateAccess API. A key vulnerability in one attack was a Global Admin account without multi-factor authentication.

Storm-0501’s cloud-based ransomware. Source: microsoft.com.

Once inside, the threat actor established persistence through malicious federated domains—enabling impersonation of legitimate users—and took control of Azure environments. They then moved to wipe backups, delete storage accounts, and create new Key Vaults with custom encryption keys, effectively locking victims out of their own data. Victims were subsequently contacted via Microsoft Teams, using compromised identities to deliver ransom demands.

Microsoft emphasizes that these attacks represent a growing trend in ransomware: one that bypasses endpoint detection and malware defenses by operating entirely within trusted cloud infrastructure.

Storm-0501’s evolution highlights a broader shift in ransomware strategy—one that exploits identity mismanagement and cloud misconfigurations rather than relying on traditional malware. Organizations must adapt by extending zero-trust principles to their cloud environments, enforcing strong authentication for privileged roles, and auditing for unused or overly permissive APIs. As ransomware becomes less about code and more about control, cloud security hygiene is mission-critical for bolstering enterprise resilience.

CSBadmin

The latest in cybersecurity news and updates.

Share This Article
Follow:
The latest in cybersecurity news and updates.
Leave a Comment