Listen to this Post
Microsoft and CrowdStrike recently uncovered a new Russian threat actor dubbed Void Blizzard, specializing in rapid exfiltration of sensitive emails and files from Microsoft 365 (M365) environments. Unlike traditional Business Email Compromise (BEC) attacks, Void Blizzard operates with alarming speedāsometimes completing an attack in just 10 seconds.
How Void Blizzard Operates
1. Initial Access:
- Attackers log in via compromised credentials, often from suspicious remote IPs (e.g., Netherlands-based Oxide Group Limited).
- No rogue apps or inbox rulesāmaking detection harder.
2. Automated Data Exfiltration:
- Within 5 seconds, attackers search and download emails containing trade secrets, financial data, or sensitive communications.
- Targets old emails (sometimes over a year old).
3. Rapid Exit:
- Attackers leave minimal forensic traces, mimicking AitM (Adversary-in-the-Middle) threats.
You Should Know: Detecting and Mitigating Void Blizzard Attacks
1. Monitor Suspicious M365 Logins
Use Microsoft Sentinel or PowerShell to track unusual login locations:
Get-AzureADAuditSignInLogs -Filter "createdDateTime gt $((Get-Date).AddHours(-24))" | Where-Object { $_.Location.Country -ne "US" } | Select-Object UserPrincipalName, IPAddress, Location, CreatedDateTime
- Enable Unified Audit Log (UAL) in Exchange Online
Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $true
3. Hunt for Rapid File Access Patterns
Use KQL (Kusto Query Language) in Microsoft Defender:
OfficeActivity | where Operation in ("FileDownloaded", "EmailAccessed") | summarize Count=count(), TimeDiff=max(TimeGenerated) - min(TimeGenerated) by UserId | where TimeDiff < 30s and Count > 10
4. Implement Conditional Access Policies
- Block logins from untrusted countries.
- Enforce MFA for all sensitive roles.
5. Check for Suspicious SharePoint Activity
Search-UnifiedAuditLog -StartDate (Get-Date).AddDays(-7) -EndDate (Get-Date) -Operations "FileDownloaded" -ResultSize 1000 | Where-Object { $<em>.UserId -like "@domain.com" } | Group-Object UserId | Where-Object { $</em>.Count -gt 50 }
What Undercode Say
Void Blizzard represents a shift towards hyper-automated, low-footprint attacks that bypass traditional SOC detection. Organizations must:
– Monitor real-time M365 activity logsānot just SIEM alerts.
– Assume credential compromiseāimplement Zero Trust.
– Use behavioral analytics (UEBA) to detect abnormal access patterns.
Prediction
Expect more AI-driven, sub-30-second attacks in 2024 as threat actors refine automation. Companies lagging in real-time log analysis will suffer the most.
Expected Output:
This post combines cybersecurity insights with actionable detection methods, ensuring defenders stay ahead of Void Blizzardās rapid attacks.
IT/Security Reporter URL:
Reported By: Theonejvo No – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ā