Tomer Iarchy
Software Engineer
Published on
October 2, 2024
The Storm-0501 cybercriminal group has launched a sophisticated, multi-stage attack campaign targeting hybrid cloud infrastructures. By exploiting weak credentials and over-privileged accounts, they successfully executed lateral movement from on-premises environments to cloud platforms. Active since 2021, Storm-0501’s earlier attacks were largely opportunistic. However, recent campaigns signal a strategic shift, with the group now focusing on exploiting vulnerabilities in hybrid environments. Their ability to move seamlessly between on-premises systems and cloud resources underscores the growing threat posed by unmanaged non-human identities (NHIs), which have become a key attack vector in these breaches.
As machine-to-machine interactions increasingly outpace human-to-machine connections, securing these digital identities has become critical, especially as the Storm-0501 attack continues to expand across hybrid cloud environments.
Organizations are grappling with complex infrastructures where resources span multiple clouds, making security perimeters increasingly difficult to define. NHIs now outnumber human identities on average by a factor to 20, according to recent research by ESG, as every SaaS, PaaS, and IaaS service has become its own identity provider. These accounts, often service accounts, govern machine-to-machine communication but introduce unique security challenges.
Recent exploits by Storm-0501 highlight how easily these accounts can be compromised if left unmanaged. The elevated permissions of these NHIs make them prime targets. By attacking on-premise servers and stealing service accounts, Storm-0501 was able to:
Exploited NHIs are often used to move laterally within the perimeter to breach other systems. Storm-0501 attackers began by exploiting vulnerabilities (such as 0-days) on on-premise servers and then used the exploited over-privileged accounts to move laterally t into cloud environments. For instance, when compromised servers utilize service accounts tied to Microsoft Entra Connect Sync, attackers can navigate from on-premise to cloud resources. If these servers do not utilize their account created at Entra ID, they are considered "stale accounts.” Addressing this situation in a timely manner can prevent lateral movement in this direction.
NHIs require a fundamentally different management approach compared to traditional human identity management. Unlike human identities, NHIs often lack clear ownership and can be distributed across multiple identity providers and vaults, complicating governance and security. Traditional Identity and Access Management (IAM) solutions fall short in effectively managing these identities.
To combat these challenges, Oasis offers the NHI Security Cloud, designed to manage and secure non-human identities effectively. Our integrated platform focuses on:
The Storm-0501 campaign underscores the vulnerabilities present in non-human identities within today's distributed environments. To effectively secure these identities and mitigate risks, organizations must adopt a proactive approach emphasizing visibility, security, and governance.
By leveraging Oasis, organizations can gain the insights and controls necessary to defend against sophisticated threats, ensuring that their non-human identities do not become the weak link in their security posture. For more information on securing your organization against emerging threats, explore our resources or contact the Oasis team for NHI management advice.