Microsoft warns that hackers are exploiting password resets to gain access to user accounts – here’s how to stay safe



  • Microsoft researchers warn that Storm-2949 is abusing the self-service password reset flow to hijack accounts
  • Attackers trick victims into approving MFA requests using phone calls, then reset passwords and exfiltrate sensitive data.
  • The campaign targets Microsoft 365 and Azure environments, with Microsoft urging stricter RBAC controls and monitoring of high-risk operations.

A hacking group known as Storm-2949 is abusing the password reset feature in Microsoft services to steal people’s login credentials, access their accounts, and extract as much sensitive data as possible.

A new report published by the Microsoft Defender security research team claims that at the center of this campaign is the self-service password reset (SSPR) flow found in the Microsoft ecosystem.

Leave a Comment

Your email address will not be published. Required fields are marked *