Source: BleepingComputer
Author: Lawrence Abrams
URL: https://www.bleepingcomputer.com/news/security/microsoft-azure-monitor-alerts-abused-in-callback-phishing-campaigns/
ONE SENTENCE SUMMARY:
Attackers misuse Azure Monitor alerts to deliver authenticated callback-phishing emails, impersonating Microsoft billing fraud notices and bypassing email defenses.
MAIN POINTS:
- Azure Monitor normally collects telemetry and triggers alerts for Azure resources and billing events.
- Recipients report alert emails alleging suspicious invoices or charges requiring immediate phone contact.
- Messages originate from legitimate azure-noreply@microsoft.com rather than spoofed domains.
- Delivered emails pass SPF, DKIM, and DMARC, increasing trust and inbox placement.
- Actors create easily triggered alert rules tied to orders, payments, and invoice conditions.
- Alert description fields allow arbitrary text, enabling insertion of phishing instructions and phone numbers.
- Alerts are sent to attacker-controlled mailing lists that forward to many targets.
- Forwarding preserves Microsoft headers and authentication results, helping evade filters and scrutiny.
- Rule names mimic billing notifications, sometimes mixing in technical alerts like memory or disk spikes.
- Goal is urgent callback leading to credential theft, payment fraud, remote access installation, or network intrusion.
TAKEAWAYS:
- Treat Microsoft/Azure alert emails containing phone numbers as highly suspicious.
- Authentication passes don’t guarantee legitimacy when platforms are abused for message delivery.
- Restrict who can create/modify Azure Monitor alert rules and notification recipients.
- Monitor for unusual alert rules with invoice/payment language in descriptions.
- Train users to verify billing issues via official portals, not numbers provided in alerts.