{"id":134300,"date":"2024-05-23T06:00:00","date_gmt":"2024-05-23T13:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=134300"},"modified":"2024-05-23T12:45:27","modified_gmt":"2024-05-23T19:45:27","slug":"cyber-signals-inside-the-growing-risk-of-gift-card-fraud","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/23\/cyber-signals-inside-the-growing-risk-of-gift-card-fraud\/","title":{"rendered":"Cyber Signals: Inside the growing risk of gift card fraud"},"content":{"rendered":"\n
In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a constant challenge. <\/p>\n\n\n\n
Microsoft Threat Intelligence has observed that gift cards are attractive targets for fraud and social engineering practices. Unlike credit or debit cards, there\u2019s no customer name or bank account attached to them, which can lessen scrutiny of their potentially suspicious use in some cases and present cybercriminals with a different type of payment card surface to study and exploit. <\/p>\n\n\n\n
Microsoft has seen an uptick in activity from threat actor group Storm-0539, also known as Atlas Lion, around the United States holidays, including Memorial Day, Labor Day, Thanksgiving, Black Friday, and Christmas. In advance of Memorial Day 2024, Microsoft has observed a 30% increase in activity from Storm-0539 between March and May 2024.<\/p>\n\n\n\n
The latest edition of Cyber Signals<\/a> dives deep into the world of gift card fraud, shedding light on Storm-0539 and its sophisticated cybercrime techniques and persistence, while providing guidance to retailers on how to stay ahead of these risks.<\/p>\n\n\n The latest report describes how organizations can protect gift cards from Storm-0539's cybercrime techniques.<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t Active since late 2021, this cybercrime group represents an evolution of threat actors who previously specialized in malware attacks on point-of-sale (POS) devices like retail cash registers and kiosks to compromise payment card data, and today they are adapting to target cloud and identity services in steadily attacking the payment and card systems associated with large retailers, luxury brands, and well-known fast food restaurants.<\/p>\n\n\n\n What sets Storm-0539 apart is its deep understanding of cloud environments, which it exploits to conduct reconnaissance on organizations\u2019 gift card issuance processes and employee access. Its approach to compromising cloud systems for far-reaching identity and access privileges mirrors the tradecraft and sophistication typically seen in nation-state-sponsored threat actors, except instead of gathering email or documents for espionage, Storm-0539 gains and uses persistent access to hijack accounts and create gift cards for malicious purposes and does not target consumers exclusively. After gaining access to an initial session and token, Storm-0539 will register its own malicious devices to victim networks for subsequent secondary authentication prompts, effectively bypassing multifactor authentication protections and persisting in an environment using the now fully compromised identity.<\/p>\n\n\n\n To remain undetected, Storm-0539 adopts the guise of legitimate organizations, obtaining resources from cloud providers under the pretense of being non-profits. It creates convincing websites, often with misleading \u201ctyposquatting\u201d domain names a few characters different from authentic websites, to lure unsuspecting victims, further demonstrating its cunning and resourcefulness.<\/p>\n\n\n\n Organizations that issue gift cards should treat their gift card portals as high-value targets for cybercriminals and should focus on continuous monitoring, and audit for anomalous activities. Implementing conditional access<\/a> policies and educating security teams on social engineering tactics are crucial steps in fortifying defenses against such sophisticated actors. Given Storm-0539’s sophistication and deep knowledge of cloud environments, it is recommended that you also invest in cloud security best practices, implement sign-in risk policies, transition to phishing-resistant multifactor authentication<\/a>, and apply the least privilege access principle.<\/p>\n\n\n\n By adopting these measures, organizations can enhance their resilience against focused cybercriminals like Storm-0539, while keeping trusted gift, payment, and other card options as attractive and flexible amenities for customers. To learn more about the latest threat intelligence insights, visit Microsoft Security Insider<\/a>.<\/p>\n\n\n\n To learn more about Microsoft Security solutions, visit our website<\/a>. Bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security<\/a>) and X (@MSFTSecurity<\/a>) for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" In the ever-evolving landscape of cyberthreats, staying ahead of malicious actors is a constant challenge. The latest edition of Cyber Signals dives deep into the world of Storm-0539, also known as Atlas Lion, shedding light on their sophisticated methods of gift and payment card theft. <\/p>\n","protected":false},"author":162,"featured_media":134378,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3663],"topic":[3664,3678,3684],"products":[],"threat-intelligence":[],"tags":[],"coauthors":[2400],"class_list":["post-134300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-research","topic-ai-and-machine-learning","topic-multifactor-authentication","topic-security-operations"],"yoast_head":"\nCyber Signals<\/h2>\n\n\t\t\t\t\t
The evolution of Storm-0539 (Atlas Lion)<\/h2>\n\n\n\n
Sophisticated strategies<\/h2>\n\n\n\n
A cloak of legitimacy<\/h2>\n\n\n\n
Defending against the storm<\/h2>\n\n\n\n