{"id":127280,"date":"2023-04-18T08:00:00","date_gmt":"2023-04-18T15:00:00","guid":{"rendered":""},"modified":"2025-06-24T03:56:06","modified_gmt":"2025-06-24T10:56:06","slug":"nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/","title":{"rendered":"Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Over the past several months, Microsoft has observed a mature subgroup of Mint Sandstorm, an Iranian nation-state actor previously tracked as PHOSPHORUS, refining its tactics, techniques, and procedures (TTPs). Specifically, this subset has rapidly weaponized N-day vulnerabilities in common enterprise applications and conducted highly-targeted phishing campaigns to quickly and successfully access environments of interest. This Mint Sandstorm subgroup has also continued to develop and use custom tooling in selected targets, notably organizations in the energy and transportation sectors. Given this subgroup\u2019s capabilities, the profile of past targets, and the potential for cascading effects, Microsoft is publishing details on known tradecraft alongside corresponding detections and mitigations to help organizations protect against this and similar threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"who-is-mint-sandstorm\">Who is Mint Sandstorm?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Mint Sandstorm is Microsoft\u2019s new name for PHOSPHORUS, an Iranian nation-state actor. This new name is part of the <a href=\"https:\/\/aka.ms\/threatactorsblog\">new threat actor naming taxonomy<\/a> we announced today, designed to keep pace with the evolving and growing threat landscape.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Mint Sandstorm is <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2019\/03\/27\/new-steps-to-protect-customers-from-hacking\/\">known<\/a> to pursue targets in both the private and public sectors,<a href=\"https:\/\/noticeofpleadings.com\/phosphorus\/files\/Complaint.pdf\"> including<\/a> political dissidents, activist leaders, the Defense Industrial Base (DIB), journalists, and employees from multiple government agencies, including individuals protesting oppressive regimes in the Middle East. &nbsp;Activity Microsoft tracks as part of the larger Mint Sandstorm group overlaps with public reporting on groups known as APT35, APT42, Charming Kitten, and TA453.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Mint Sandstorm is a composite name used to describe several subgroups of activity with ties to the same organizational structure. Microsoft assesses that Mint Sandstorm is associated with <a href=\"https:\/\/sgp.fas.org\/crs\/mideast\/R47321.pdf\">an intelligence arm of Iran\u2019s military,<\/a> the Islamic Revolutionary Guard Corps (IRGC), an assessment that has been corroborated by multiple credible sources including <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/apt42-charms-cons-compromises\">Mandiant<\/a>, <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/badblood-ta453-targets-us-and-israeli-medical-research-personnel-credential\">Proofpoint<\/a>, and <a href=\"https:\/\/www.secureworks.com\/blog\/cobalt-illusion-masquerades-as-atlantic-council-employee\">SecureWorks<\/a>.&nbsp; In 2022, the US Department of Treasury <a href=\"https:\/\/home.treasury.gov\/news\/press-releases\/jy0948\">sanctioned<\/a> elements of Mint Sandstorm for past cyberattacks citing sponsorship from the IRGC.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Today, Microsoft is reporting on a distinct Mint Sandstorm subgroup that specializes in hacking into and stealing sensitive information from high-value targets. This Mint Sandstorm subgroup is technically and operationally mature, capable of developing bespoke tooling and quickly weaponizing N-day vulnerabilities, and has demonstrated agility in its operational focus, which appears to align with Iran\u2019s &nbsp;national priorities.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Threat Intelligence consistently tracks threat actor activity, including Mint Sandstorm and its subgroups, and works across Microsoft Security products and services to build detections into our products that improve protection for customers. As with any observed nation state actor activity, Microsoft directly notifies customers that have been targeted or compromised, providing them with the information they need to secure their accounts. Microsoft is sharing details on these operations to raise awareness on the risks associated with their activity and to empower organizations to harden their attack surfaces against tradecraft commonly used by this Mint Sandstorm subgroup.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"recent-operations\">Recent operations<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">From late 2021 to mid-2022, this Mint Sandstorm subgroup moved from reconnaissance to direct targeting of US critical infrastructure including seaports, energy companies, transit systems, and a major US utility and gas entity potentially in support of retaliatory destructive cyberattacks. This targeting was likely in response to Iran\u2019s attribution of cyberattacks that <a href=\"https:\/\/www.washingtonpost.com\/national-security\/officials-israel-linked-to-a-disruptive-cyberattack-on-iranian-port-facility\/2020\/05\/18\/9d1da866-9942-11ea-89fd-28fb313d1886_story.html.\">halted maritime traffic at a major Iranian seaport<\/a> in May 2020, <a href=\"https:\/\/www.reuters.com\/world\/middle-east\/hackers-breach-iran-rail-network-disrupt-service-2021-07-09\/\">delayed Iranian trains<\/a> in July 2021, and <a href=\"https:\/\/www.iranintl.com\/en\/20211028899666\">crashed gas station payment systems<\/a> throughout Iran in late 2021. Of note, a senior cybersecurity-focused IRGC official and others close to the Iranian Supreme Leader pinned the attack affecting <a href=\"https:\/\/www.iranintl.com\/en\/20211028899666\">gas station payment systems<\/a> on Israel and the United States.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This targeting also coincided with a broader increase in the pace and the scope of cyberattacks attributed to Iranian threat actors, including another Mint Sandstorm subgroup, that Microsoft observed beginning in September 2021. The increased aggression of Iranian threat actors appeared to correlate with other moves by the Iranian regime under a new national security apparatus, <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE5bUvv?culture=en-us&amp;country=us\">suggesting<\/a> such groups are less bounded in their operations. &nbsp;Given the hardline consensus among policymakers in Tehran and sanctions previously levied on Iran\u2019s security organizations, Mint Sandstorm subgroups may be less constrained in carrying out malicious cyber activity.<strong> <em><\/em><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mint-sandstorm-tradecraft\">Mint Sandstorm tradecraft<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft has observed multiple attack chains and various tools in compromises involving this Mint Sandstorm subgroup. The TTPs detailed below are a sampling of new or otherwise notable tradecraft used by this actor.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"rapid-adoption-of-publicly-disclosed-pocs-for-initial-access-and-persistence\">Rapid adoption of publicly disclosed POCs for initial access and persistence<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft has increasingly observed this Mint Sandstorm subgroup adopting publicly disclosed proof-of-concept (POC) code shortly after it is released to exploit vulnerabilities in internet-facing applications. Until 2023, this subgroup had been slow to adopt exploits for recently-disclosed vulnerabilities with publicly reported POCs, often taking several weeks to successfully weaponize exploits for vulnerabilities like Proxyshell and Log4Shell. However, beginning in early 2023, Microsoft observed a notable decrease in the time required for this subgroup to adopt and&nbsp;incorporate public POCs. For example, Mint Sandstorm began exploiting <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2022-47966\">CVE-2022-47966<\/a> in Zoho ManageEngine on January 19, 2023, the same day the POC became public. They later exploited <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2022-47986\">CVE-2022-47986<\/a> in Aspera Faspex within five days of the POC being made public on February 2, 2023.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While this subgroup has demonstrated their ability to rapidly incorporate new public POCs into their playbooks, Microsoft has also observed that Mint Sandstorm continues to use older vulnerabilities, especially Log4Shell, to compromise unpatched devices. <strong>As this activity is typically opportunistic and indiscriminate, Microsoft recommends that organizations regularly patch vulnerabilities with publicly available POCs, regardless of how long the POC has been available.<\/strong><strong><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">After gaining initial access to an organization by exploiting a vulnerability with a public POC, this Mint Sandstorm subgroup deploys a custom PowerShell script designed for discovery. In some cases, the subgroup does not act on the information they collect, possibly because they assess that a victim does not meet any targeting requirements or because the subgroup wishes to wait and focus on more valuable targets. In cases where Mint Sandstorm operators continue their pursuit of a given target, Microsoft typically observes one of two possible attack chains.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"533\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Figure-1.-The-two-attack-chains-used-by-the-Mint-Sandstorm-subgroup.png\" alt=\"Diagram of Mint Sandstorm attack chain examples\" class=\"wp-image-127282\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Figure-1.-The-two-attack-chains-used-by-the-Mint-Sandstorm-subgroup.png 975w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Figure-1.-The-two-attack-chains-used-by-the-Mint-Sandstorm-subgroup-300x164.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Figure-1.-The-two-attack-chains-used-by-the-Mint-Sandstorm-subgroup-768x420.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><figcaption class=\"wp-element-caption\"><em>Figure 1. The two attack chains used by the Mint Sandstorm subgroup<\/em><\/figcaption><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Attack chain <\/strong><strong>1<\/strong><strong>:<\/strong> The Mint Sandstorm subgroup proceeds using Impacket to move laterally through a compromised organization and relies extensively on PowerShell scripts (rather than custom implants) to enumerate admin accounts and enable RDP connections. In this attack chain, the subgroup uses an SSH tunnel for command and control (C2), and the final objective in many cases is theft of the Active Directory database. If obtained, the Mint Sandstorm subgroup can use the Active Directory database to access credentials for users\u2019 accounts. In cases where users\u2019 credentials are accessed and the target organization has not reset corresponding passwords, the actors can log in with stolen credentials and masquerade as legitimate users, possibly without attracting attention from defenders. The actors could also gain access to other systems where individuals may have reused their passwords.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Attack chain <\/strong><strong>2<\/strong>: As is the case in attack chain 1, the Mint Sandstorm subgroup uses Impacket to move laterally. However, in this progression, the operators use <em>webhook.site<\/em> for C2 and create scheduled tasks for persistence. Finally, in this attack chain, the actors deploy a custom malware variant, such as Drokbk or Soldier. These custom malware variants signal an increase in the subgroup\u2019s level of sophistication, as they shift from using publicly available tools and simple scripts to deploying fully custom developed malicious code.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"use-of-custom-tools-to-evade-detection\">Use of custom tools to evade detection<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Since 2022,Microsoft has observed this Mint Sandstorm subgroup using two custom implants, detected by Microsoft security products as Drokbk and Soldier, to persist in target environments and deploy additional tools. Drobkbk and Soldier both use Mint Sandstorm-controlled GitHub repositories to host a domain rotator containing the operators\u2019 C2 domains. This allows Mint Sandstorm to dynamically update their C2 infrastructure, which may help the operators stay a step ahead of defenders using list-based domain blocking.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Drokbk<\/strong>: <em>Drokbk.exe<\/em> is a custom .NET implant with two components: an installer, sometimes accessed from a compressed archive on a legitimate file-sharing platform, and a secondary backdoor payload. The Drokbk backdoor issues a web request to obtain the contents of a <em>README<\/em> file on a Mint Sandstorm-controlled GitHub repo. The <em>README<\/em> file contains a list of URLs that direct targets to the C2 infrastructure associated with Drokbk.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Soldier<\/strong><strong>: <\/strong>Soldier is a multistage .NET backdoor with the ability to download and run additional tools and uninstall itself. Like Drokbk, Soldier C2 infrastructure is stored on a domain rotator on a GitHub repository operated by Mint Sandstorm. Microsoft Threat Intelligence analysts assess that Soldier is a more sophisticated variant of Drokbk.<strong><\/strong><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">In certain cases, this Mint Sandstorm subgroup has used TTPs outside of these attack chains, notably when they have failed to achieve short-term objectives. In one instance, Microsoft also observed the subgroup using TTPs from both attack chains in a single compromised environment. However, in most cases, Mint Sandstorm activity displays one of the above discussed attack chains.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"low-volume-phishing-campaigns-using-template-injection\">Low-volume phishing campaigns using template injection<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft has also observed this Mint Sandstorm subgroup using a distinct attack chain involving low-volume phishing campaigns and a third custom implant.<strong>&nbsp; <\/strong>In these operations, the group crafts bespoke phishing emails, often purporting to contain information on security policies that affect countries in the Middle East, to deliver weaponized documents to individuals of interest. Recipients are typically individuals affiliated with high-profile think tanks or universities in Israel, North America, or Europe with ties to the security and policy communities. Unlike their initial exploitation of vulnerable internet-facing applications, which is largely indiscriminate and affects organizations across sectors and geographies, activity associated with this campaign was highly targeted and affected fewer than 10 organizations..<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The initial emails are most commonly lures designed to social engineer recipients into clicking a OneDrive link hosting a PDF spoofed to resemble information on a topic involving security or policy in the Middle East. The PDF contains a link to a macro-enabled template file (dotm) hosted on Dropbox. This file has been weaponized with macros to perform remote template injection, a technique that allows operators to obtain and launch a payload from a remote C2, often OneDrive. Template injection is an attractive option for adversaries looking to execute malicious code without drawing scrutiny from defenders. This technique can also be used to persist in a compromised environment if an adversary replaces a default template used by a common application.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In these attacks, Microsoft has observed the Mint Sandstorm subgroup using CharmPower, a custom implant, in attacks that began with targeted phishing campaigns.<strong>&nbsp;<\/strong>CharmPower is a modular backdoor written in PowerShell that this subgroup delivers in phishing campaigns that rely on <a href=\"https:\/\/www.pwc.com\/gx\/en\/issues\/cybersecurity\/cyber-threat-intelligence\/old-cat-new-tricks.html\">template injection<\/a>. CharmPower can read files, gather information on an infected host, and send details back to the attackers.&nbsp;<a href=\"https:\/\/www.pwc.com\/gx\/en\/issues\/cybersecurity\/cyber-threat-intelligence\/old-cat-new-tricks.html\">Reporting<\/a> from <a href=\"https:\/\/research.checkpoint.com\/2022\/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit\/\">Checkpoint<\/a> indicates that at least one version of CharmPower pulls data from a specific text file that contains a hardcoded victim identifier. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"196\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Figure-2.-Template-injection-technique.png\" alt=\"Diagram of Mint Sandstorm's template injection technique\" class=\"wp-image-127283\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Figure-2.-Template-injection-technique.png 975w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Figure-2.-Template-injection-technique-300x60.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Figure-2.-Template-injection-technique-768x154.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><figcaption class=\"wp-element-caption\"><em>Figure 2. Template injection technique<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-s-next\">What\u2019s next<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Capabilities observed in intrusions attributed to this Mint Sandstorm subgroup are concerning as they allow operators to conceal C2 communication, persist in a compromised system, and deploy a range of post-compromise tools with varying capabilities. While effects vary depending on the operators\u2019 post-intrusion activities, even initial access can enable unauthorized access and facilitate further behaviors that may adversely impact the confidentiality, integrity, and availability of an environment. A successful intrusion creates liabilities and may harm an organization\u2019s reputation, especially those responsible for delivering services to others such as critical infrastructure providers, which Mint Sandstorm has targeted in the past. &nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As these operators increasingly develop and use sophisticated capabilities, organizations must develop corresponding defenses to harden their attack surfaces and raise costs for these operators. Microsoft will continue to monitor Mint Sandstorm activity and implement protections for our customers. The current detections, advanced detections, and IOCs in place across our security products are detailed below and shared with the broader security community to help detect and prevent further attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mitigation-and-protection-guidance\">Mitigation and protection guidance<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The techniques used by this subset of Mint Sandstorm can be mitigated through the following actions:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"hardening-internet-facing-assets-and-understanding-your-perimeter\">Hardening internet-facing assets and understanding your perimeter<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Organizations must identify and secure perimeter systems that attackers might use to access the network. Public scanning interfaces, such as <a href=\"https:\/\/www.microsoft.com\/security\/business\/cloud-security\/microsoft-defender-external-attack-surface-management\">Microsoft Defender External Attack Surface Management<\/a>, can be used to improve data.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Vulnerabilities observed in recent campaigns attributed to this Mint Sandstorm subgroup that defenders can identify and mitigate include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">IBM Aspera Faspex affected by CVE-2022-47986: Organizations can remediate CVE-2022-47986 by upgrading to Faspex 4.4.2 Patch Level 2 or using Faspex 5.x which does not contain this vulnerability. More details are available in IBM\u2019s security advisory <a href=\"https:\/\/www.ibm.com\/support\/pages\/node\/6952319\">here<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Zoho ManageEngine affected by CVE-2022-47966: Organizations using Zoho ManageEngine products vulnerable to CVE-2022-47966 should download and apply upgrades from the <a href=\"https:\/\/www.manageengine.com\/security\/advisory\/CVE\/cve-2022-47966.html\">official advisory<\/a> as soon as possible. Patching this vulnerability is useful beyond this specific campaign as several adversaries are exploiting CVE-2022-47966 for initial access.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Apache Log4j2 (aka Log4Shell) (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2021-44228\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-44228<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45046\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-45046<\/a>): Microsoft\u2019s guidance for organizations using applications vulnerable to Log4Shell exploitation can be found&nbsp;<a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/12\/11\/microsofts-response-to-cve-2021-44228-apache-log4j2\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>. This guidance is useful for any organization with vulnerable applications and useful beyond this specific campaign, as&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/12\/11\/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation\/\" target=\"_blank\" rel=\"noreferrer noopener\">several adversaries<\/a>&nbsp;exploit Log4Shell to obtain initial access.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">This Mint Sandstorm subgroup has demonstrated its ability to rapidly adopt newly reported N-day vulnerabilities into its playbooks. To further reduce organizational exposure, Microsoft Defender for Endpoint customers can use the&nbsp;<a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/security\/defender-endpoint\/next-gen-threat-and-vuln-mgt\">threat and vulnerability management<\/a>&nbsp;capability to discover, prioritize, and remediate vulnerabilities and misconfigurations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"reducing-the-attack-surface\">Reducing the attack surface<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft 365&nbsp;Defender customers can also turn on&nbsp;<a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/security\/defender-endpoint\/attack-surface-reduction?view=o365-worldwide\">attack surface reduction rules<\/a> to harden their environments against techniques used by this Mint Sandstorm subgroup. These rules, which can be configured by all <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/enable-cloud-protection-microsoft-defender-antivirus?view=o365-worldwide\">Microsoft Defender Antivirus<\/a> customers and not just those using the EDR solution, offer significant protection against the tradecraft discussed in this report.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/attack-surface-reduction-rules-reference?view=o365-worldwide#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion\">Block executable files from running unless they meet a prevalence, age, or trusted list criterion<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\">Block Office applications from creating executable content<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Block process creations originating from PSExec and WMI commands<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Additionally, in 2022, Microsoft<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/ba-p\/3071805\"> changed the default behavior<\/a> of Office applications to block macros in files from the internet, further minimizing the attack surface for operators like this subgroup of Mint Sandstorm.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-365-defender-detections\">Microsoft 365 Defender detections<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Microsoft Defender Antivirus<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender Antivirus detects the Drokbk implant as the following malware:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:MSIL\/Drokbk.A!dha&amp;threatId=-2147147037\">Trojan:MSIL\/Drokbk.A!dha<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:MSIL\/Drokbk.B!dha&amp;threatId=-2147147036\">Trojan:MSIL\/Drokbk.B!dha<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:MSIL\/Drokbk.C!dha&amp;threatId=-2147123260\">Trojan:MSIL\/Drokbk.C!dha<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:Win32\/Drokbk.C!dha&amp;threatId=-2147123261\">Trojan:Win32\/Drokbk.C!dha <\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">&nbsp; Microsoft Defender Antivirus detects the Soldier implant as the following malware:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:MSIL\/SoldierAudio.A!dha&amp;threatId=-2147123264\">Trojan:MSIL\/SoldierAudio.A!dha<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:MSIL\/SoldierAudio.B!dha&amp;threatId=-2147123263\">Trojan:MSIL\/SoldierAudio.B!dha<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:MSIL\/SoldierAudio.C!dha&amp;threatId=-2147123262\">Trojan:MSIL\/SoldierAudio.C!dha<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender Antivirus detects the CharmPower implant as the following malware:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=TrojanDownloader:O97M\/RooftopMelt.A!dha&amp;threatId=-2147123265\">TrojanDownloader:O97M\/RooftopMelt.A!dha<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Microsoft Defender for Endpoint<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The following Microsoft Defender for Endpoint alerts can indicate associated threat activity:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Phosphorus Actor activity detected<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"hunting-queries\">Hunting queries<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Microsoft 365 Defender<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft 365 Defender customers can run the following query to find related activity in their networks:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>ManageEngine Suspicious Process Execution. &nbsp;<\/strong><\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\nDeviceProcessEvents\n| where InitiatingProcessFileName hasprefix \"java\"\n| where InitiatingProcessFolderPath  has @\"\\manageengine\\\" or InitiatingProcessFolderPath has @\"\\ServiceDesk\\\"\n| where (FileName in~ (\"powershell.exe\", \"powershell_ise.exe\") and\n            (ProcessCommandLine has_any (\"whoami\", \"net user\", \"net group\", \"localgroup administrators\", \"dsquery\", \"samaccountname=\", \" echo \", \"query session\", \"adscredentials\", \"o365accountconfiguration\", \"-dumpmode\", \"-ssh\", \"usoprivate\", \"usoshared\", \"Invoke-Expression\", \"DownloadString\", \"DownloadFile\", \"FromBase64String\",  \"System.IO.Compression\", \"System.IO.MemoryStream\", \"iex \", \"iex(\", \"Invoke-WebRequest\", \"set-MpPreference\", \"add-MpPreference\", \"certutil\", \"bitsadmin\") \/\/ \"csvhost.exe\", \"ekern.exe\", \"svhost.exe\", \".dmp\"\n             or ProcessCommandLine matches regex @\"[-\/\u2013][Ee^]{1,2}[ncodema^]*\\s[A-Za-z0-9+\/=]{15,}\"))\n           or (FileName =~ \"curl.exe\" and ProcessCommandLine contains \"http\")\n           or (FileName =~ \"wget.exe\" and ProcessCommandLine contains \"http\")\n           or ProcessCommandLine has_any (\"E:jscript\", \"e:vbscript\")\n           or ProcessCommandLine has_all (\"localgroup Administrators\", \"\/add\")\n           or ProcessCommandLine has_all (\"reg add\", \"DisableAntiSpyware\", @\"\\Microsoft\\Windows Defender\")\n           or ProcessCommandLine has_all (\"reg add\", \"DisableRestrictedAdmin\", @\"CurrentControlSet\\Control\\Lsa\")\n           or ProcessCommandLine has_all (\"wmic\", \"process call create\")\n           or ProcessCommandLine has_all (\"net\", \"user \", \"\/add\")\n           or ProcessCommandLine has_all (\"net1\", \"user \", \"\/add\")\n           or ProcessCommandLine has_all (\"vssadmin\", \"delete\", \"shadows\")\n           or ProcessCommandLine has_all (\"wmic\", \"delete\", \"shadowcopy\")\n           or ProcessCommandLine has_all (\"wbadmin\", \"delete\", \"catalog\")\n           or (ProcessCommandLine has \"lsass\" and ProcessCommandLine has_any (\"procdump\", \"tasklist\", \"findstr\"))\n | where ProcessCommandLine !contains \"download.microsoft.com\" and ProcessCommandLine !contains \"manageengine.com\" and ProcessCommandLine !contains \"msiexec\"\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\"><strong>Ruby AsperaFaspex Suspicious Process Execution.<\/strong><\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\nDeviceProcessEvents\n| where InitiatingProcessFileName hasprefix \"ruby\"\n| where InitiatingProcessFolderPath has @\"aspera\"\n| where (FileName in~ (\"powershell.exe\", \"powershell_ise.exe\") and\n            (ProcessCommandLine has_any (\"whoami\", \"net user\", \"net group\", \"localgroup administrators\", \"dsquery\", \"samaccountname=\", \" echo \", \"query session\", \"adscredentials\", \"o365accountconfiguration\", \"-dumpmode\", \"-ssh\", \"usoprivate\", \"usoshared\", \"Invoke-Expression\", \"DownloadString\", \"DownloadFile\", \"FromBase64String\",  \"System.IO.Compression\", \"System.IO.MemoryStream\", \"iex \", \"iex(\", \"Invoke-WebRequest\", \"set-MpPreference\", \"add-MpPreference\", \"certutil\", \"bitsadmin\", \"csvhost.exe\", \"ekern.exe\", \"svhost.exe\", \".dmp\")\n             or ProcessCommandLine matches regex @\"[-\/\u2013][Ee^]{1,2}[ncodema^]*\\s[A-Za-z0-9+\/=]{15,}\"))\n           or (FileName =~ \"curl.exe\" and ProcessCommandLine contains \"http\")\n           or (FileName =~ \"wget.exe\" and ProcessCommandLine contains \"http\")\n           or ProcessCommandLine has_any (\"E:jscript\", \"e:vbscript\")\n           or ProcessCommandLine has_all (\"localgroup Administrators\", \"\/add\")\n           or ProcessCommandLine has_all (\"reg add\", \"DisableAntiSpyware\", @\"\\Microsoft\\Windows Defender\")\n           or ProcessCommandLine has_all (\"reg add\", \"DisableRestrictedAdmin\", @\"CurrentControlSet\\Control\\Lsa\")\n           or ProcessCommandLine has_all (\"wmic\", \"process call create\")\n           or ProcessCommandLine has_all (\"net\", \"user \", \"\/add\")\n           or ProcessCommandLine has_all (\"net1\", \"user \", \"\/add\")\n           or ProcessCommandLine has_all (\"vssadmin\", \"delete\", \"shadows\")\n           or ProcessCommandLine has_all (\"wmic\", \"delete\", \"shadowcopy\")\n           or ProcessCommandLine has_all (\"wbadmin\", \"delete\", \"catalog\")\n           or (ProcessCommandLine has \"lsass\" and ProcessCommandLine has_any (\"procdump\", \"tasklist\", \"findstr\"))\n\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\"><strong>Log4J Wstomcat Process Execution.<\/strong><\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\nDeviceProcessEvents\n| where InitiatingProcessFileName has \"ws_tomcatservice.exe\" and FileName !in~(\"repadmin.exe\")\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\"><strong>Encoded watcher Function<\/strong>.<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\nDeviceProcessEvents \n| where FileName =~ \"powershell.exe\" and ProcessCommandLine hasprefix \"-e\"\n| extend SplitString = split(ProcessCommandLine, \" \")\n| mvexpand SS = SplitString \n| where SS matches regex \"^[A-Za-z0-9+\/]{50,}[=]{0,2}$\"\n| extend base64_decoded = replace(@'\\0', '', make_string(base64_decode_toarray(tostring(SS))))\n| where not(base64_decoded has_any(@\"software\\checker\", \"set folder to watch\"))\n| where base64_decoded has_all(\"$hst\", \"$prt\") or base64_decoded has_any(\"watcher\", @\"WAt`CH`Er()\")\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\"><strong>&nbsp;Microsoft Sentinel<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Sentinel customers can use the TI Mapping analytic (a series of analytics all prefixed with \u201cTI map\u201d) to automatically match the indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the Microsoft Sentinel Content Hub to have the analytics rule deployed in their Sentinel workspace. More details on the Content Hub can be found here: <a href=\"https:\/\/learn.microsoft.com\/azure\/sentinel\/sentinel-solutions-deploy\">https:\/\/learn.microsoft.com\/azure\/sentinel\/sentinel-solutions-deploy<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, Microsoft Sentinel customers can leverage the following content to hunt for and detect related activity in their environments:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/azuremarketplace.microsoft.com\/en-us\/marketplace\/apps\/azuresentinel.azure-sentinel-solution-apachelog4jvulnerability?tab=Overview\">Log4J solution<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Attacker%20Tools%20Threat%20Protection%20Essentials\/Hunting%20Queries\/PotentialImpacketExecution.yaml\">Potential Impacket Execution<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Windows%20Security%20Events\/Hunting%20Queries\/CommandsexecutedbyWMIonnewhosts-potentialImpacket.yaml\">Commands executed by WMI on new hosts &#8211; potential Impacket<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Windows%20Security%20Events\/Analytic%20Rules\/ScheduleTaskHide.yaml\">Scheduled Task Hidden<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Hunting%20Queries\/SecurityEvent\/RemoteScheduledTaskCreationUpdateviaSchtasks.yaml\">Remote Task Creation\/Update using Schtasks Process<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Solutions\/Endpoint%20Threat%20Protection%20Essentials\/Hunting%20Queries\/ScheduledTaskCreationUpdateFromUserWritableDrectory.yaml\">Scheduled Task Creation or Update from User Writable Directory<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/W3CIISLog\/ProxyShellPwn2Own.yaml\">Exchange SSRF Autodiscover ProxyShell &#8211; Detection<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"indicators-of-compromise\">Indicators of compromise<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Indicator<\/strong><\/td><td><strong>Type<\/strong><\/td><td><strong>Description<\/strong><\/td><\/tr><tr><td>Soldier.exe<\/td><td>File name<\/td><td>Soldier backdoor<\/td><\/tr><tr><td>ad55b4a40f9e52682d9d4f069914e09c941e8b77ca7b615e9deffccdfbc54145<\/td><td>SHA-256<\/td><td>Soldier backdoor hash<\/td><\/tr><tr><td>Drokbk.exe<\/td><td>File name<\/td><td>Drokbk backdoor<\/td><\/tr><tr><td>64f39b858c1d784df1ca8eb895ac7eaf47bf39acf008ed4ae27a796ac90f841b<\/td><td>SHA-256<\/td><td>Drokbk backdoor hash<\/td><\/tr><tr><td>sync-system-time[.]cf<\/td><td>Domain<\/td><td>Drokbk C2 infrastructure<\/td><\/tr><tr><td>update-windows-security[.]tk<\/td><td>Domain<\/td><td>Drokbk C2 infrastructure<\/td><\/tr><tr><td>dns-iprecords[.]tk<\/td><td>Domain<\/td><td>Drokbk C2 infrastructure<\/td><\/tr><tr><td>universityofmhealth[.]biz<\/td><td>Domain<\/td><td>Drokbk C2 infrastructure<\/td><\/tr><tr><td>oracle-java[.]cf<\/td><td>Domain<\/td><td>Drokbk C2 infrastructure<\/td><\/tr><tr><td>54.39.202[.]0&nbsp;<\/td><td>IP address<\/td><td>Drokbk C2 infrastructure<\/td><\/tr><tr><td>51.89.135[.]15<\/td><td>IP address<\/td><td>Drokbk C2 infrastructure<\/td><\/tr><tr><td>51.89.169[.]201<\/td><td>IP address<\/td><td>Drokbk C2 infrastructure<\/td><\/tr><tr><td>51.89.187[.]222<\/td><td>IP address<\/td><td>Drokbk C2 infrastructure<\/td><\/tr><tr><td>NY.docx.docx<\/td><td>File name<\/td><td>CharmPower lure document used for template injection<\/td><\/tr><tr><td>57cc5e44fd84d98942c45799f367db78adc36a5424b7f8d9319346f945f64a72<\/td><td>SHA-256<\/td><td>NY.docx.docx hash<\/td><\/tr><tr><td>Abraham%20Accords%20Du.[.]docx<\/td><td>File name<\/td><td>CharmPower lure document used for template injection<\/td><\/tr><tr><td>3dcdb0ffebc5ce6691da3d0159b5e811c7aa91f6d8fc204963d2944225b0119d<\/td><td>SHA-256<\/td><td>Abraham%20Accords%20Du.[.]docx hash<\/td><\/tr><tr><td>DocTemplate.dotm<\/td><td>File name<\/td><td>Malicious remote template document used in intrusions involving CharmPower<\/td><\/tr><tr><td>65e48f63f455c94d3bf681acaf115caa6e1e60499362add49ca614458bbc4f85<\/td><td>SHA-256<\/td><td>DocTemplate.dotm<\/td><\/tr><tr><td>DntDocTemp.dotm<\/td><td>File name<\/td><td>Malicious remote template document used in intrusions involving CharmPower<\/td><\/tr><tr><td>444075183ff6cae52ab5b93299eb9841dcd8b0321e3a90fb29260dc12133b6a2&nbsp;&nbsp;&nbsp;<\/td><td>SHA-256<\/td><td>DntDocTemp.dotm hash<\/td><\/tr><tr><td>0onlyastep0[.]xyz<\/td><td>Domain<\/td><td>CharmPower C2 infrastructure<\/td><\/tr><tr><td>0readerazone0[.]xyz<\/td><td>Domain<\/td><td>CharmPower C2 infrastructure<\/td><\/tr><tr><td>0tryamore0[.]xyz<\/td><td>Domain<\/td><td>CharmPower C2 infrastructure<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"references\">References<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/sgp.fas.org\/crs\/mideast\/R47321.pdf\">Iran: Background and U.S. Policy<\/a>. Congressional Research Service<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.secureworks.com\/blog\/cobalt-illusion-masquerades-as-atlantic-council-employee\">Cobalt Illusion Masquerades as Atlantic Council Employee.<\/a> Secureworks<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.mandiant.com\/resources\/blog\/apt42-charms-cons-compromises\">Apt42: Crooked Charms, Cons, and Compromises<\/a>. Mandiant<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/badblood-ta453-targets-us-and-israeli-medical-research-personnel-credential\">Badblood: TA453 Targets US &amp; Israel in Credential Phishing<\/a>. Proofpoint<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/home.treasury.gov\/news\/press-releases\/jy0948\">Treasury Sanctions IRGC-Affiliated Cyber Actors for Roles in Ransomware Activity<\/a>. U.S. Department of the Treasury<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.washingtonpost.com\/national-security\/officials-israel-linked-to-a-disruptive-cyberattack-on-iranian-port-facility\/2020\/05\/18\/9d1da866-9942-11ea-89fd-28fb313d1886_story.html.\">Officials: Israel Linked to a Disruptive Cyberattack on Iranian Port Facility<\/a>. The Washington Post<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.reuters.com\/world\/middle-east\/iran-says-cyberattack-behind-widespread-disruption-gas-stations-2021-10-26\/\">Iran Says Cyberattack Causes Widespread Disruption at Gas Stations<\/a>. Thomson Reuters<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/web.archive.org\/web\/20200504225030\/https:\/www.washingtoninstitute.org\/uploads\/Documents\/pubs\/PolicyFocus164-Nadimi-v2.pdf\">Iran\u2019s Evolving Approach to Asymmetric Naval Warfare<\/a>. The Washington Institute for Near East Policy<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.reuters.com\/world\/middle-east\/hackers-breach-iran-rail-network-disrupt-service-2021-07-09\/\">Hackers breach Iran rail network, disrupt service | Reuters<\/a>. Reuters<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/research.checkpoint.com\/2022\/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit\/\">APT35 Exploits Log4J Vulnerability to Distribute New Modular PowerShell Toolkit.<\/a> Checkpoint<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.iranintl.com\/en\/20211028778677\">Iran Says Gas Stations Were Target Of Cyberattack To Foment Unrest (iranintl.com)<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/noticeofpleadings.com\/phosphorus\/files\/Complaint.pdf\">Complaint &#8211; Summons &#8211; Civil Cover Sheet.pdf (noticeofpleadings.com)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, Microsoft is reporting on a distinct subset of Mint Sandstorm (formerly known as PHOSPHORUS), an Iranian threat actor that specializes in hacking into and stealing sensitive information from high-value targets. This subset is technically and operationally mature, capable of developing bespoke tooling and quickly weaponizing recently disclosed vulnerabilities.<\/p>\n","protected":false},"author":153,"featured_media":127297,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3784,3905,3922,3908],"threat-intelligence":[3738],"content-type":[3663],"job-role":[],"product":[3690],"topic":[3687],"coauthors":[3380],"class_list":["post-127280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-log4j","tag-mint-sandstorm-phosphorus","tag-sandstorm","tag-state-sponsored-threat-actor","threat-intelligence-threat-actors","content-type-research","product-microsoft-defender","topic-threat-intelligence","review-flag-1694638272-264","review-flag-1694638265-576","review-flag-1694638265-310","review-flag-1694638265-83","review-flag-1694638271-781","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-4-1694638266-512","review-flag-5-1694638266-171","review-flag-9-1694638266-118","review-flag-lever-1694638263-909","review-flag-new-1694638263-340"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"A mature subgroup of Mint Sandstorm is weaponizing N-day vulnerabilities in apps &amp; conducting phishing campaigns to access environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"A mature subgroup of Mint Sandstorm is weaponizing N-day vulnerabilities in apps &amp; conducting phishing campaigns to access environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-18T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T10:56:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Mint-Sandstorm-Dark-Blue.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Threat Intelligence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Mint-Sandstorm-Dark-Blue.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Threat Intelligence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Threat Intelligence\"}],\"headline\":\"Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets\",\"datePublished\":\"2023-04-18T15:00:00+00:00\",\"dateModified\":\"2025-06-24T10:56:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/\"},\"wordCount\":3038,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Featured-image-2.jpg\",\"keywords\":[\"Log4j\",\"Mint Sandstorm (PHOSPHORUS)\",\"Sandstorm\",\"State-sponsored threat actor\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/\",\"name\":\"Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Featured-image-2.jpg\",\"datePublished\":\"2023-04-18T15:00:00+00:00\",\"dateModified\":\"2025-06-24T10:56:06+00:00\",\"description\":\"A mature subgroup of Mint Sandstorm is weaponizing N-day vulnerabilities in apps & conducting phishing campaigns to access environments.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Featured-image-2.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Featured-image-2.jpg\",\"width\":1200,\"height\":793,\"caption\":\"a group of people sitting at a desk in front of a computer\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/fa785acae88a9b0cfe278a692ce196f5\",\"name\":\"Microsoft Security Threat Intelligence\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g430eaf64ccad6ceda364c6ea504461c5\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g\",\"caption\":\"Microsoft Security Threat Intelligence\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-katiemc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets | Microsoft Security Blog","description":"A mature subgroup of Mint Sandstorm is weaponizing N-day vulnerabilities in apps & conducting phishing campaigns to access environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/","og_locale":"en_US","og_type":"article","og_title":"Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets | Microsoft Security Blog","og_description":"A mature subgroup of Mint Sandstorm is weaponizing N-day vulnerabilities in apps & conducting phishing campaigns to access environments.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/","og_site_name":"Microsoft Security Blog","article_published_time":"2023-04-18T15:00:00+00:00","article_modified_time":"2025-06-24T10:56:06+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Mint-Sandstorm-Dark-Blue.png","type":"image\/png"}],"author":"Microsoft Threat Intelligence","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Mint-Sandstorm-Dark-Blue.png","twitter_misc":{"Written by":"Microsoft Threat Intelligence","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/","@type":"Person","@name":"Microsoft Threat Intelligence"}],"headline":"Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets","datePublished":"2023-04-18T15:00:00+00:00","dateModified":"2025-06-24T10:56:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/"},"wordCount":3038,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Featured-image-2.jpg","keywords":["Log4j","Mint Sandstorm (PHOSPHORUS)","Sandstorm","State-sponsored threat actor"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/","name":"Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Featured-image-2.jpg","datePublished":"2023-04-18T15:00:00+00:00","dateModified":"2025-06-24T10:56:06+00:00","description":"A mature subgroup of Mint Sandstorm is weaponizing N-day vulnerabilities in apps & conducting phishing campaigns to access environments.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Featured-image-2.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Featured-image-2.jpg","width":1200,"height":793,"caption":"a group of people sitting at a desk in front of a computer"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/fa785acae88a9b0cfe278a692ce196f5","name":"Microsoft Security Threat Intelligence","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g430eaf64ccad6ceda364c6ea504461c5","url":"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g","caption":"Microsoft Security Threat Intelligence"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-katiemc\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/127280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=127280"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/127280\/revisions"}],"predecessor-version":[{"id":140083,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/127280\/revisions\/140083"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/127297"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=127280"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=127280"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=127280"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=127280"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=127280"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=127280"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=127280"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=127280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}