Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with šŸ’™ by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
Peach Sandstorm targeting Azure

Peach Sandstorm targeting Azure

Type
Campaign
Actors
šŸ‘Peach Sandstorm
Pub. date
September 14, 2023
Initial access
1-day vulnerabilityPassword attack
Impact
Data exfiltration
Observed techniques
Password sprayingLOLBin abuseAuth token signing via Golden SAMLTOR anonymizationAzure Arc abuse
Observed tools
AzureHoundROADtoolsEagleRelayAnyDesk
Targeted technologies
Zoho ManageEngineConfluence Server
References
https://www.microsoft.com/en-us/security/blog/2023/09/14/peach-sandstorm-password-spray-campaigns-enable-intelligence-collection-at-high-value-targets/https://www.bleepingcomputer.com/news/security/iranian-hackers-breach-defense-orgs-in-password-spray-attacks/
Status
Finalized
Last edited
Oct 14, 2024 1:54 PM

According to Microsoft Threat Research, during a campaign by Iranian state-sponsored actor Peach Sandstorm, they were observed utilizing password spray attacks to gain unauthorized access to target environments. Active since February 2023, the campaign successfully targeted satellite, defense, and pharmaceutical sectors.

Besides password spraying, Peach Sandstorm also exploited remote code execution (RCE) vulnerabilities in Zoho ManageEngine (CVE-2022-47966) and Atlassian Confluence (CVE-2022-26134) for gaining initial access.

Once they gained a foothold in a target environment, they employed a mix of publicly available and custom tools for reconnaissance, persistence, and lateral movement. Operating from Tor IPs with aĀ go-http-clientĀ user agent, they were seen leveraging tools likeĀ AzureHoundĀ andĀ RoadtoolsĀ for reconnaissance while exploiting Azure resources for persistence. In at least one incident, Peach Sandstorm conducted a Golden SAML attack to access a target’s cloud resources.

Peach Sandstorm also made use of compromised Azure credentials, created new subscriptions within the victims' Azure tenants, and abused Azure Arc for persistence purposes to control devices in victims' on-premises networks.