Microsoft warns that hackers are exploiting password resets to gain access to user accounts: here’s how to stay safe


  • Microsoft researchers warn that Storm‑2949 is abusing the self-service password reset flow to hack accounts.
  • Attackers trick victims into approving MFA prompts via phone calls, then reset passwords and exfiltrate sensitive data.
  • The campaign targets Microsoft 365 and Azure environments, with Microsoft calling for stricter RBAC controls and monitoring of high-risk operations.

A group of hackers known as Storm-2949 are abusing the password reset feature of Microsoft services to steal users’ login credentials, gain access to their accounts, and exfiltrate as much sensitive data as possible.

A new report released by the Microsoft Defender Security Research team claims that the Self-Service Password Reset (SSPR) flow present in the Microsoft ecosystem is at the heart of this campaign.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top