{"id":127091,"date":"2023-04-07T09:00:00","date_gmt":"2023-04-07T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=127091"},"modified":"2024-07-03T08:10:14","modified_gmt":"2024-07-03T15:10:14","slug":"mercury-and-dev-1084-destructive-attack-on-hybrid-environment","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/07\/mercury-and-dev-1084-destructive-attack-on-hybrid-environment\/","title":{"rendered":"MERCURY and DEV-1084: Destructive attack on hybrid environment"},"content":{"rendered":"\n
\n\n

April 2023 update<\/strong> \u2013 Microsoft Threat Intelligence has shifted to a new threat actor naming taxonomy aligned around the theme of weather. MERCURY<\/strong> is now tracked as Mango Sandstorm<\/strong> and DEV-1084<\/strong> is now tracked as Storm-1084<\/strong>. <\/p>\n\n\n

To learn more about the new taxonomy represents the origin, unique traits, and impact of threat actors, to get complete mapping of threat actor names, read this blog: Microsoft shifts to a new threat actor naming taxonomy<\/strong><\/a>.<\/p>\n\n<\/blockquote>\n\n\n\n

Microsoft Threat Intelligence has detected destructive operations enabled by MERCURY<\/a>, a nation-state actor linked to the Iranian government, that attacked both on-premises and cloud environments. While the threat actors attempted to masquerade the activity as a standard ransomware campaign, the unrecoverable actions show destruction and disruption were the ultimate goals of the operation.<\/p>\n\n\n\n

Previous MERCURY attacks have been observed targeting on-premises environments, however, the impact in this case notably also included destruction of cloud resources. Microsoft assesses that MERCURY likely worked in partnership with another actor that Microsoft tracks as DEV-1084, who carried out the destructive actions after MERCURY\u2019s successful operations had gained access to the target environment.<\/p>\n\n\n\n

MERCURY likely exploited known vulnerabilities in unpatched applications for initial access before handing off access to DEV-1084 to perform extensive reconnaissance and discovery, establish persistence, and move laterally throughout the network, oftentimes waiting weeks and sometimes months before progressing to the next stage. DEV-1084 was then later observed leveraging highly privileged compromised credentials to perform en masse destruction of resources, including server farms, virtual machines, storage accounts, and virtual networks, and send emails to internal and external recipients.<\/p>\n\n\n\n

In this blog post, we detail our analysis of the observed actor activity and related tools. We also share information to the community and industry partners on ways to detect these attacks, including detection details of MERCURY and DEV-1084\u2019s tools in Microsoft 365 Defender, Microsoft Defender for Identity, Microsoft Defender for Cloud Applications, Microsoft Defender Antivirus, and Microsoft Defender for Endpoint. As with any observed nation-state actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments.<\/p>\n\n\n\n

Microsoft uses DEV-#### designations as a temporary name given to an unknown, emerging, or a developing cluster of threat activity, allowing Microsoft to track it as a unique set of information until we reach high confidence about the origin or identity of the actor behind the activity.<\/p>\n\n\n\n

Who is DEV-1084? <\/em><\/h2>\n\n\n\n

Microsoft tracks the destructive actions documented in this blog post as DEV-1084. DEV-1084 likely worked in partnership with MERCURY\u2014an Iran-based actor that the US Cyber Command has publicly linked to Iran\u2019s Ministry of Intelligence and Security (MOIS)<\/a>. DEV-1084 publicly adopted the DarkBit persona and presented itself as a criminal actor interested in extortion, likely as an attempt to obfuscate Iran\u2019s link to and strategic motivation for the attack.<\/p>\n\n\n\n

The link between the DEV-1084 cluster and MERCURY was established based on the following evidence:<\/p>\n\n\n\n