Microsoft Graph is becoming a popular target for hackers

Multiple hacker collectives have been actively using the Microsoft Graph API to conceal their communications with command and control (C2) infrastructure hosted on Microsoft cloud services, cybersecurity researchers from the Symantec Threat Hunter Team revealed.

Researchers say that for two and a half years, groups such as APT28, REF2924, Red Stinger, Flea, APT29 and Oilrig have been using this technique to stay out of sight. Among the targets was an anonymous organization in Ukraine, which was infected by a previously unknown malware variant called BirdyClient.

scroll to top