Microsoft Warns Hackers Exploit Password Resets to Access User Accounts – Here’s How to Stay Safe


  • Microsoft researchers warn that Storm-2949 is abusing the self-service password reset process to hijack accounts
  • Attackers trick victims into accepting MFA prompts via phone calls, then reset passwords and exfiltrate sensitive data
  • The campaign targets Microsoft 365 and Azure environments, where Microsoft is calling for tighter RBAC controls and monitoring of high-risk operations

A hacker group known as Storm-2949 is abusing the password reset feature in Microsoft services to steal people’s login credentials, gain access to their accounts, and exfiltrate as much sensitive data as possible.

A new report published by the Microsoft Defender Security Research Team claims that the core of this campaign is the Self-Service Password Reset (SSPR) flow found in the Microsoft ecosystem.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top