
Recent reports have highlighted a concerning trend where cyber attackers are increasingly exploiting Microsoft Graph API as a tool for stealthy operations. Notably, threat groups like APT28, REF2924, and Red Stinger have been using this API to bypass detection mechanisms and facilitate communication with their command-and-control centers, which are hosted on Microsoft's cloud services. This exploitation allows for covert data theft and malware communications, posing significant challenges to cybersecurity defenses.



Attackers were observed evading detection by leveraging the @Microsoft Graph API used by developers to access resources on Microsoft cloud services. #cybersecurity #infosec #ITsecurity https://t.co/JVLA3QvBV6
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications https://t.co/tXfw88qcjr
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications: https://t.co/NhdBSmrRWq by The Hacker News #infosec #cybersecurity #technology #news