Cybersecurity7 hrs ago

Microsoft Credential Theft Campaign Hits 35k Users Across 13k Orgs

Microsoft reveals a credential‑theft campaign affecting over 35,000 users in 13,000+ organizations; twin brothers charged with destroying government databases; NYC Health + Hospitals breach exposes 1.8 million patient records.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Microsoft Credential Theft Campaign Hits 35k Users Across 13k Orgs
Credit: UnsplashOriginal source

Microsoft disclosed a credential‑theft campaign that compromised more than 35,000 user accounts in over 13,000 organizations across 26 countries. Twin brothers Muneeb and Suhaib Akhter are charged with destroying over 30 government databases and deleting more than 1,800 files, while a breach at NYC Health + Hospitals Corporation potentially exposed data of 1.8 million patients.

Context Phishing attacks are increasingly using legitimate‑looking email templates and trusted services to bypass user suspicion. At the same time, insider threats continue to cause severe damage when privileged accounts are misused. Healthcare organizations remain a prime target for data theft due to the value of patient records.

Key Facts The Microsoft campaign used code‑of‑conduct‑themed phishing lures that redirected victims to attacker‑controlled domains to steal authentication tokens. The emails featured polished HTML layouts and authenticity statements, making them appear legitimate. Most targets were in healthcare, life sciences, financial services, professional services and technology sectors across 26 countries.

Federal prosecutors allege that the twin brothers, former employees of a government‑focused software firm, accessed privileged accounts and deliberately destroyed more than 30 databases and over 1,800 files tied to a IRS and GSA project. The actions caused system outages and permanent data loss, prompting an FBI investigation.

NYC Health + Hospitals Corporation detected unauthorized access to a web application containing guest reservation data in late March. The intrusion persisted for more than six months before discovery, potentially exposing personal information of over 1.8 million individuals. The hospital has begun notifying affected patients and warning them of follow‑up phishing attempts.

What It Means Organizations should enforce multi‑factor authentication, monitor token usage for anomalous sign‑ins, and apply email security gateways that detect look‑alike domains. Security teams can hunt for MITRE ATT&CK technique T1566.002 (phishing via service) and T1078 (valid accounts) using Azure AD sign‑in logs. Regular conditional access policies that block legacy authentication also reduce risk.

For insider risk, implement least‑privilege access, segregate duties, and enable real‑time alerts on privileged account activity via tools such as Microsoft Defender for Identity. Regularly review and revoke unnecessary permissions, especially for contractors and former employees. Conduct periodic access reviews and maintain immutable audit logs to detect misuse.

Healthcare providers must patch web‑application vulnerabilities, segment reservation systems, and conduct continuous monitoring for unauthorized data exfiltration. Deploying deception technology and conducting regular phishing simulations can reduce user susceptibility. Ensure backup integrity and test restoration procedures quarterly.

Looking ahead, defenders should watch for continued abuse of legitimate authentication flows, increased use of AI‑generated phishing content, and any follow‑up activity linked to the Akhter case or the hospital breach.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...