Within the ever-evolving panorama of cyberthreats, staying forward of malicious actors is a continuing problem.
Microsoft Risk Intelligence has noticed that reward playing cards are engaging targets for fraud and social engineering practices. In contrast to credit score or debit playing cards, there’s no buyer title or checking account connected to them, which might reduce scrutiny of their doubtlessly suspicious use in some instances and current cybercriminals with a special kind of cost card floor to check and exploit.
Microsoft has seen an uptick in exercise from menace actor group Storm-0539, also referred to as Atlas Lion, round america holidays, together with Memorial Day, Labor Day, Thanksgiving, Black Friday, and Christmas. Prematurely of Memorial Day 2024, Microsoft has noticed a 30% enhance in exercise from Storm-0539 between March and Could 2024.
The most recent version of Cyber Indicators dives deep into the world of reward card fraud, shedding gentle on Storm-0539 and its refined cybercrime strategies and persistence, whereas offering steering to retailers on find out how to keep forward of those dangers.

Cyber Indicators
The most recent report describes how organizations can shield reward playing cards from Storm-0539’s cybercrime strategies.
The evolution of Storm-0539 (Atlas Lion)
Lively since late 2021, this cybercrime group represents an evolution of menace actors who beforehand specialised in malware assaults on point-of-sale (POS) gadgets like retail money registers and kiosks to compromise cost card information, and right this moment they’re adapting to focus on cloud and identification providers in steadily attacking the cost and card programs related to massive retailers, luxurious manufacturers, and well-known quick meals eating places.
Subtle methods
What units Storm-0539 aside is its deep understanding of cloud environments, which it exploits to conduct reconnaissance on organizations’ reward card issuance processes and worker entry. Its method to compromising cloud programs for far-reaching identification and entry privileges mirrors the tradecraft and class sometimes seen in nation-state-sponsored menace actors, besides as a substitute of gathering e-mail or paperwork for espionage, Storm-0539 good points and makes use of persistent entry to hijack accounts and create reward playing cards for malicious functions and doesn’t goal customers completely. After having access to an preliminary session and token, Storm-0539 will register its personal malicious gadgets to sufferer networks for subsequent secondary authentication prompts, successfully bypassing multifactor authentication protections and persisting in an atmosphere utilizing the now absolutely compromised identification.
A cloak of legitimacy
To stay undetected, Storm-0539 adopts the guise of legit organizations, acquiring assets from cloud suppliers below the pretense of being non-profits. It creates convincing web sites, usually with deceptive “typosquatting” domains a number of characters completely different from genuine web sites, to lure unsuspecting victims, additional demonstrating its crafty and resourcefulness.
Defending towards the storm
Organizations that problem reward playing cards ought to deal with their reward card portals as high-value targets for cybercriminals and will give attention to steady monitoring, and audit for anomalous actions. Implementing conditional entry insurance policies and educating safety groups on social engineering ways are essential steps in fortifying defenses towards such refined actors. Given Storm-0539’s sophistication and deep information of cloud environments, it’s endorsed that you just additionally put money into cloud safety greatest practices, implement sign-in threat insurance policies, transition to phishing-resistant multifactor authentication, and apply the least privilege entry precept.
By adopting these measures, organizations can improve their resilience towards targeted cybercriminals like Storm-0539, whereas holding trusted reward, cost, and different card choices as engaging and versatile facilities for patrons. To study extra concerning the newest menace intelligence insights, go to Microsoft Safety Insider.
To study extra about Microsoft Safety options, go to our web site. Bookmark the Safety weblog to maintain up with our knowledgeable protection on safety issues. Additionally, observe us on LinkedIn (Microsoft Safety) and X (@MSFTSecurity) for the most recent information and updates on cybersecurity.