Contacts
Book a Meet
Close

Contacts

Bulgaria, Kavarna
Saudi Arabia, Riyadh

+359 875 328030

sales@diamatix.com

Microsoft Warns of New Wave of Social Engineering Campaigns by Storm Actors Targeting Europe & the Middle East

cyber chain

Microsoft Warns of New Wave of Social Engineering Campaigns by Storm Actors Targeting Europe & the Middle East

Microsoft Threat Intelligence has issued a new warning about an active wave of social engineering campaigns conducted by multiple state-aligned groups known collectively as Storm actors.
These campaigns use impersonation, credential harvesting and trust-based manipulation to gain access to high-value corporate and institutional environments.

According to Microsoft, the campaigns currently target:

  • organizations across Europe and the Middle East, including EU member states

  • sectors such as telecommunications, energy, logistics, public services and finance

  • third-party providers and MSP/MSSP partners with privileged access to client systems

How Storm Actors Operate

Microsoft highlights several tactics observed across recent attacks:

✔ Impersonation of trusted partners

Emails mimicking government agencies, ministries, service providers or international organizations.

✔ Highly personalized spear-phishing

Messages referencing real names, roles, projects or internal processes to increase credibility.

✔ Malicious or replaced documents delivered via cloud services

Including OneDrive, SharePoint and other legitimate channels.

✔ Use of compromised business accounts

Storm actors leverage credentials from previous breaches to appear legitimate.

✔ Post-compromise objectives

Credential theft, lateral movement, persistence and exfiltration of sensitive information.

According to Microsoft, this activity fits a long-term strategy by state-aligned groups to infiltrate corporate environments, extract intelligence and influence operational decisions.

DIAMATIX Perspective

State-aligned social engineering attacks cannot be stopped by perimeter controls alone. They require continuous visibility, contextual telemetry and behavior-based detection across identities, devices and cloud applications.

DIAMATIX supports clients with:

🔹 MDR 360° + 24/7 SOC

Detection of suspicious logins, anomalous cloud interactions, privilege escalation and lateral movement.

🔹 Shield SIEM/XDR

Correlation of email events, identity logs, endpoint telemetry and network indicators to surface early warning signs.

🔹 Threat Hunting

Targeted hunts for TTPs associated with Storm actors:

  • impersonation

  • cloud-based exfiltration

  • stealthy command channels

  • credential theft and manipulation

🔹 Zero-Trust Identity Policies

Limiting blast radius when accounts are compromised.

🔹 Third-Party Risk Evaluation

Storm actors frequently compromise suppliers to reach the primary target.

“When attackers rely on trust — not malware — the decisive advantage comes from visibility, context and real-time response.”

Contact DIAMATIX


Sources

  • Microsoft Threat Intelligence – Social Engineering Campaign Reports

  • Microsoft Security Intelligence – Storm Actor Behavioral Analysis

  • Recorded Future – State-Aligned Campaigns Targeting Europe and MENA

Ready to go further?

Experience how continuous detection and response enhance compliance in action with MDR 360°.

Request MDR 360° Demo

Subscribe for latest updates & insights

Please enable JavaScript in your browser to complete this form.