Microsoft Threat Intelligence
@MsftSecIntel
Followers
188K
Following
2K
Media
721
Statuses
6K
We are Microsoft's global network of security experts. Follow for security research and threat intelligence.
Redmond, WA
Joined November 2010
New blog post: Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack. https://t.co/R41QPav8mO In defending against threats like Shai-Hulud 2.0, organizations benefit significantly from the layered protection from Microsoft Defender,
microsoft.com
The Shai‑Hulud 2.0 supply chain attack represents one of the most significant cloud-native ecosystem compromises observed recently. Attackers maliciously modified hundreds of publicly available...
2
22
54
The December 2025 security updates are available:
Security updates for December 2025 are now available. Details are here: https://t.co/WW89TchdN8
#PatchTuesday #SecurityUpdateGuide
1
20
43
"Defense is doable… We have to be brilliant at the basics... It’s about doing really good access management, really good principle of least privilege, really good network architecture..." -- Matt Duncan, E-ISAC VP of Security Operations and Intelligence
thecyberwire.com
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Matt Duncan, Vice President of Security Operations and Intelligence at the North American...
0
4
22
Like similar Storm-0900 activity, this campaign led to XWorm, a popular modular malware used by many threat actors for remote access, deployment of other malware, and data theft. XWorm uses plugins that threat actors can use to perform various tasks on compromised devices. These
1
5
14
The URLs in the phishing emails redirected to an attacker-controlled landing page on the malicious domain permit-service[.]top that employed several rounds of user interaction. First, users needed to solve a slider CAPTCHA by clicking and dragging a slider, followed by ClickFix,
3
5
16
On Thanksgiving eve, November 26, Microsoft detected and blocked a high-volume phishing campaign from a threat actor we track as Storm-0900. The campaign used parking ticket and medical test result themes and referenced Thanksgiving to lend credibility and lower recipients’
2
40
157
Throughout 2025, Tycoon2FA (tracked by Microsoft as Storm-1747) has consistently been the most prolific phishing-as-a-service (PhaaS) platform observed by Microsoft. In October 2025, Microsoft Defender for Office 365 blocked more than 13 million malicious emails linked to
3
39
124
For more details and practical guidance, tune in to this Microsoft Threat Intelligence Podcast episode hosted by Sherrod DeGrippo, featuring insights from Anna Seitz and Tori Murphy.
0
1
4
Vanilla Tempest, another financially motivated group, used SEO poisoning to distribute fake, fraudulently signed Teams installers to deliver ransomware. Their TTPs include abusing code signing, opportunistic targeting, & exploiting known vulnerabilities.
1
1
4
The Storm-2657 “payroll pirate” campaign targeted universities by exploiting compromised email accounts and weak MFA protocols, using phishing emails to steal credentials and reroute salary payments.
microsoft.com
Microsoft Threat Intelligence has identified a financially motivated threat actor that we track as Storm-2657 compromising employee accounts to gain unauthorized access to employee profiles and...
1
1
1
Attackers are increasingly weaponizing trust in identity and code to achieve financial gain.
thecyberwire.com
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Tori Murphy and Anna Seitz to unpack two financially motivated cyber...
4
14
38
The Threat Intelligence Briefing Agent, which delivers daily customized briefings that combine Microsoft’s global threat intelligence with insights specific to each organization, is now fully integrated into the Microsoft Defender portal, available in public preview.
8
38
193
And to make it easier than ever for organizations to harness the power of Security Copilot agents to protect at the speed and scale of AI, Security Copilot will be included for all Microsoft 365 E5 customers. Learn more:
learn.microsoft.com
Learn about Security Copilot availability in Microsoft 365 (ME5)
0
2
7
These adaptive agents run side by side with security teams to triage incidents, optimize conditional access policies, surface threat intelligence, and maintain secure, compliant endpoints more easily.
learn.microsoft.com
Learn about Microsoft Security Copilot agents.
1
2
5
Microsoft is introducing a dozen new and enhanced Microsoft Security Copilot agents in Microsoft Defender, Microsoft Entra, Microsoft Intune, & Microsoft Purview. Our partner community also released more than 30 new Security Copilot agents.
microsoft.com
At Microsoft Ignite 2025, we are not just announcing new features—we are redefining what’s possible, empowering security teams to shift from reactive responses to proactive strategies.
2
4
26
The November 2025 security updates are available:
Security updates for November 2025 are now available! Details are here: https://t.co/WW89TcgFXA
#PatchTuesday #SecurityUpdateGuide
2
21
55
Microsoft has discovered a new type of side-channel attack against streaming-mode language models using network packet sizes and timings. https://t.co/HAa7IYyhHR An attacker in a position to observe the encrypted traffic could use this type of side-channel attack to conclude
microsoft.com
Understand the risks of encrypted AI traffic exposure and explore practical steps users and cloud providers can take to stay secure. Learn more.
0
31
87
Dive into the heart of threat intelligence as Principal Security Researcher @yo_yo_yo_jbo reveals how proactive security research powers Microsoft’s defenses: https://t.co/VgoMyoiCgJ. The relentless hunt for vulnerabilities—like the HM Surf exploit—spotlights how research doesn’t
0
6
40
In the latest Microsoft Threat Intelligence Podcast episode, Sherrod DeGrippo and Zack Korman explore the future risks and opportunities that AI introduces in cybersecurity, cutting through hype to discuss where AI is both brilliant and flawed:
thecyberwire.com
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Zack Korman, CTO of cybersecurity startup Pistachio. They explore the reality of AI in securi...
1
18
45
Microsoft Incident Response – Detection and Response Team (DART) uncovered SesameOp, a new backdoor that uses the OpenAI Assistants API for C2. DART shared the findings with OpenAI, who identified and disabled an API key and associated account. https://t.co/xflPrSQReI SesameOp
microsoft.com
Microsoft Incident Response – Detection and Response Team (DART) researchers uncovered a new backdoor that is notable for its novel use of the OpenAI Assistants Application Programming Interface...
5
63
193