{"id":332376,"date":"2025-03-10T15:36:03","date_gmt":"2025-03-10T19:36:03","guid":{"rendered":"https:\/\/msftnewsnow.com\/?p=332376"},"modified":"2025-05-06T17:36:30","modified_gmt":"2025-05-07T00:36:30","slug":"microsoft-exposes-malvertising-campaign-how-to-pro","status":"publish","type":"post","link":"https:\/\/msftnewsnow.com\/microsoft-exposes-malvertising-campaign-how-to-pro\/","title":{"rendered":"Microsoft exposes malicious advertising, &#8220;malvertising campaign&#8221; blitz: 5 ways to protect your account on GitHub"},"content":{"rendered":"<p><a href=\"https:\/\/msftnewsnow.com\/tag\/microsoft\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a> has sounded the alarm on a sophisticated malvertising campaign that leverages GitHub to distribute malicious information-stealing malware, affecting nearly one million devices worldwide. This campaign, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/03\/06\/malvertising-campaign-leads-to-info-stealers-hosted-on-github\/\" target=\"_blank\" rel=\"noopener\">uncovered by Microsoft&#8217;s Threat Intelligence Center<\/a>, highlights the evolving nature of cyber threats and the importance of vigilance in the digital landscape.<\/p>\n<h2><strong>Understanding the malvertising campaign<\/strong><\/h2>\n<p><img decoding=\"async\" data-attachment-id=\"332400\" data-permalink=\"https:\/\/msftnewsnow.com\/microsoft-exposes-malvertising-campaign-how-to-pro\/featured-image-1536x858\/#main\" data-orig-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Featured-image-1536x858-1.webp?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-orig-size=\"1080,603\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Featured-image-1536&#215;858\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Featured-image-1536x858-1.webp?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-large-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Featured-image-1536x858-1.webp?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" class=\"alignnone wp-image-332400 size-full\" src=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Featured-image-1536x858-1.webp?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" alt=\"Microsoft exposes malicious advertising, &quot;malvertising campaign&quot; blitz: How GitHub became a hub for info stealers\" width=\"1080\" height=\"603\" srcset=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Featured-image-1536x858-1.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 1080w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Featured-image-1536x858-1-150x84.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 150w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Featured-image-1536x858-1.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=216&amp;ssl=1 216w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Featured-image-1536x858-1.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=432&amp;ssl=1 432w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Featured-image-1536x858-1.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=648&amp;ssl=1 648w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/Featured-image-1536x858-1.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=864&amp;ssl=1 864w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><br \/>\nThe malvertising campaign in question involves malicious advertisements that redirect users to <a href=\"https:\/\/msftnewsnow.com\/tag\/github\" target=\"_blank\" rel=\"noopener\">GitHub<\/a>-hosted repositories containing info stealers. These info stealers are designed to capture sensitive user data, such as login credentials and personal information, which can then be exploited for financial gain or other malicious purposes.<\/p>\n<h2><strong>How malvertising works<\/strong><\/h2>\n<p><img decoding=\"async\" data-attachment-id=\"332416\" data-permalink=\"https:\/\/msftnewsnow.com\/microsoft-exposes-malvertising-campaign-how-to-pro\/malvertising\/#main\" data-orig-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/malvertising.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-orig-size=\"720,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"malvertising\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/malvertising.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-large-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/malvertising.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" class=\"alignnone size-full wp-image-332416\" src=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/malvertising.jpg?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" alt=\"Microsoft exposes malicious advertising, &quot;malvertising campaign&quot; blitz: How GitHub became a hub for info stealers\" width=\"720\" height=\"720\" srcset=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/malvertising.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 720w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/malvertising-150x150.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 150w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/malvertising.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=288&amp;ssl=1 288w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/malvertising.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=432&amp;ssl=1 432w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/malvertising.jpg?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=576&amp;ssl=1 576w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/p>\n<p>Here&#8217;s a breakdown of how the malvertising campaign works:<\/p>\n<ol>\n<li><strong>Malicious ads<\/strong>: The campaign begins with <a href=\"https:\/\/msftnewsnow.com\/microsoft-edge-browser-intros-ai-scareware-blocker\/\" target=\"_blank\" rel=\"noopener\">malicious ads displayed on compromised websites or browsers<\/a>, often on illegal streaming sites. These ads are embedded within video streams to generate pay-per-view or pay-per-click revenue from malvertising platforms.<\/li>\n<li><strong>Redirect to GitHub<\/strong>: Upon clicking these ads, users are redirected through multiple layers of malicious redirectors, ultimately landing on GitHub repositories. These repositories were used to deploy a series of files and scripts as part of a modular and multi-stage approach to payload delivery, execution, and persistence.<\/li>\n<li><strong>Info stealers deployment<\/strong>: Once users land on these repositories, they may be prompted to download files or execute scripts that install info stealers on their devices. These malware tools then begin collecting sensitive information, including system details and user data.<\/li>\n<\/ol>\n<p><img decoding=\"async\" data-attachment-id=\"332396\" data-permalink=\"https:\/\/msftnewsnow.com\/microsoft-exposes-malvertising-campaign-how-to-pro\/general-depiction-of-the-four-stages-diagram-1\/#main\" data-orig-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/General-depiction-of-the-four-stages-diagram-1.webp?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-orig-size=\"1035,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"General-depiction-of-the-four-stages-diagram (1)\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/General-depiction-of-the-four-stages-diagram-1.webp?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" data-large-file=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/General-depiction-of-the-four-stages-diagram-1.webp?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" class=\"alignnone wp-image-332396 size-full\" src=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/General-depiction-of-the-four-stages-diagram-1.webp?strip=all&lossy=1&quality=88&sharp=1&ssl=1\" alt=\"Microsoft exposes malicious advertising, &quot;malvertising campaign&quot; blitz: How GitHub became a hub for info stealers\" width=\"1035\" height=\"720\" srcset=\"https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/General-depiction-of-the-four-stages-diagram-1.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 1035w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/General-depiction-of-the-four-stages-diagram-1-150x104.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;ssl=1 150w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/General-depiction-of-the-four-stages-diagram-1.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=207&amp;ssl=1 207w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/General-depiction-of-the-four-stages-diagram-1.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=414&amp;ssl=1 414w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/General-depiction-of-the-four-stages-diagram-1.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=621&amp;ssl=1 621w, https:\/\/e7drz69p964.exactdn.com\/wp-content\/uploads\/2025\/03\/General-depiction-of-the-four-stages-diagram-1.webp?strip=all&amp;lossy=1&amp;quality=88&amp;sharp=1&amp;w=828&amp;ssl=1 828w\" sizes=\"(max-width: 1035px) 100vw, 1035px\" \/><\/p>\n<h2><strong>The adverse effects of the malvertising campaign<\/strong><\/h2>\n<p>This malvertising campaign poses significant risks to users across various sectors. The use of <a href=\"https:\/\/msftnewsnow.com\/tag\/GitHub\" target=\"_blank\" rel=\"noopener\">GitHub<\/a> as a hosting platform adds complexity to the threat landscape, as it exploits the trust users have in reputable services. The targeted sectors of the campaign include:<\/p>\n<ol>\n<li><strong>Government and NGOs<\/strong>: These organizations often handle sensitive information, making them prime targets for data breaches.<\/li>\n<li><strong>IT services and technology<\/strong>: Companies in this sector may have access to valuable intellectual property and customer data.<\/li>\n<li><strong>Defense and telecommunications<\/strong>: These sectors handle critical infrastructure and national security information.<\/li>\n<li><strong>Health and higher education<\/strong>: Institutions in these sectors often possess sensitive personal data.<\/li>\n<\/ol>\n<h2><strong>How to protect against these types of threats<\/strong><\/h2>\n<p>To <a href=\"https:\/\/msftnewsnow.com\/microsoft-exposes-malvertising-campaign-how-to-pro\/\" target=\"_blank\" rel=\"noopener\">protect against this and similar threats<\/a>, users and organizations should adopt robust <a href=\"https:\/\/msftnewsnow.com\/tag\/cybersecurity\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> practices:<\/p>\n<ol>\n<li><strong>Be cautious with ads<\/strong>: Avoid clicking on suspicious or unfamiliar ads, especially those prompting downloads or redirects to unknown sites.<\/li>\n<li><strong>Use ad blockers<\/strong>: Implementing ad blockers can significantly reduce exposure to malicious ads.<\/li>\n<li><strong>Regularly update software<\/strong>: Ensure all software, including browsers and operating systems, is up-to-date with the latest security patches.<\/li>\n<li><strong>Use strong antivirus software<\/strong>: Install reputable antivirus software that includes anti-malware protection.<\/li>\n<li><strong>Educate users<\/strong>: Conduct regular cybersecurity awareness training to help users recognize phishing attempts and other threats.<\/li>\n<\/ol>\n<p>Microsoft&#8217;s warning highlights the evolving nature of cyber threats and the need for continuous vigilance. As threats become more sophisticated, relying on trusted platforms like <a href=\"https:\/\/msftnewsnow.com\/tag\/github\" target=\"_blank\" rel=\"noopener\">GitHub<\/a> to host malicious content, users must be proactive in protecting themselves. By understanding these threats and implementing robust cybersecurity measures, individuals and organizations can safeguard their digital assets effectively. See the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/03\/06\/malvertising-campaign-leads-to-info-stealers-hosted-on-github\/\" target=\"_blank\" rel=\"noopener\">full Microsoft blog post here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has sounded the alarm on a sophisticated malvertising campaign that leverages GitHub to distribute malicious information-stealing malware, affecting nearly one million devices worldwide. This campaign, uncovered by Microsoft&#8217;s Threat Intelligence Center, highlights the evolving nature of cyber threats and the importance of vigilance in the digital landscape. Understanding the malvertising campaign The malvertising campaign &#8230; <a title=\"Microsoft exposes malicious advertising, &#8220;malvertising campaign&#8221; blitz: 5 ways to protect your account on GitHub\" class=\"read-more\" href=\"https:\/\/msftnewsnow.com\/microsoft-exposes-malvertising-campaign-how-to-pro\/\" aria-label=\"Read more about Microsoft exposes malicious advertising, &#8220;malvertising campaign&#8221; blitz: 5 ways to protect your account on GitHub\">Read more<\/a><\/p>\n","protected":false},"author":208461344,"featured_media":332416,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[24],"tags":[1271,1035,778,1083],"class_list":["post-332376","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-cybersecurity","tag-github","tag-microsoft","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/msftnewsnow.com\/wp-content\/uploads\/2025\/03\/malvertising.jpg","jetpack_shortlink":"https:\/\/wp.me\/pfgCZY-1osU","jetpack-related-posts":[{"id":17856,"url":"https:\/\/msftnewsnow.com\/fake-google-chrome-errors-trick-users-into-running\/","url_meta":{"origin":332376,"position":0},"title":"Fake Google Chrome errors trick users into running malicious PowerShell scripts","author":"Dave W. Shanahan","date":"June 18, 2024","format":false,"excerpt":"A new and insidious phishing campaign has been discovered, targeting unsuspecting users with fake Google Chrome errors that trick them into running malicious PowerShell scripts. This sophisticated attack highlights the ongoing threat of social engineering and the importance of user vigilance in the face of increasingly sophisticated cyber threats.","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Fake Google Chrome errors trick users into running malicious Microsoft PowerShell scripts","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/06\/chromeerrors.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/06\/chromeerrors.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/06\/chromeerrors.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/06\/chromeerrors.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":21265,"url":"https:\/\/msftnewsnow.com\/microsoft-sway-exploited-by-qr-code-phishing-steal\/","url_meta":{"origin":332376,"position":1},"title":"Microsoft Sway is being exploited by a QR code phishing campaign to steal Microsoft 365 credentials","author":"Dave W. Shanahan","date":"August 29, 2024","format":false,"excerpt":"A massive QR code phishing campaign has been uncovered, exploiting Microsoft Sway to steal Microsoft 365 credentials. This campaign, identified by Netskope Threat Labs, marks a significant increase in attacks utilizing Microsoft Sway, highlighting the evolving tactics employed by cybercriminals. QR code phishing campaign exploiting Microsoft Sway The phishing campaign\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Microsoft Sway is being exploited by a QR code phishing campaign to steal Microsoft 365 credentials","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/08\/OIP-6.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":21410,"url":"https:\/\/msftnewsnow.com\/russian-group-romcom-exploits-microsoft-office\/","url_meta":{"origin":332376,"position":2},"title":"Russian group RomCom exploits Microsoft Office and Windows HTML RCE zero-day vulnerability CVE-2023-36884 to deploy malicious ransomware","author":"Dave W. Shanahan","date":"September 4, 2024","format":false,"excerpt":"A critical security threat has emerged as the Russian group RomCom, also known as Storm-0978, has been actively exploiting a Microsoft Office and Windows HTML Remote Code Execution (RCE) zero-day vulnerability, identified as CVE-2023-36884, to deploy ransomware.","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"Russian group RomCom exploits Microsoft Office and Windows HTML RCE zero-day vulnerability CVE-2023-36884 to deploy malicious ransomware","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/09\/OIG3-2.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/09\/OIG3-2.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/09\/OIG3-2.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/09\/OIG3-2.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":17243,"url":"https:\/\/msftnewsnow.com\/hackers-use-microsoft-365-office-docs\/","url_meta":{"origin":332376,"position":3},"title":"Hackers weaponizing Microsoft 365 Office documents to deploy malware and other attacks","author":"Dave W. Shanahan","date":"May 29, 2024","format":false,"excerpt":"The weaponization of Microsoft 365 Office documents by hackers underscores the need for heightened vigilance and robust cybersecurity practices. By understanding the methods used by cybercriminals and implementing comprehensive security measures, businesses can better protect themselves against these sophisticated attacks. Staying informed about the latest threats and continuously updating security\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"microsoft 365 office documents","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/pkusslapts2qpkwu0rnf.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/pkusslapts2qpkwu0rnf.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/pkusslapts2qpkwu0rnf.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/pkusslapts2qpkwu0rnf.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":17284,"url":"https:\/\/msftnewsnow.com\/microsoft-uncovers-moonstone-sleet-hack\/","url_meta":{"origin":332376,"position":4},"title":"Microsoft uncovers &#8220;Moonstone Sleet,&#8221; new North Korean hacker group actively targeting the United States","author":"Dave W. Shanahan","date":"May 29, 2024","format":false,"excerpt":"Microsoft has identified a new North Korean state-sponsored hacking group, dubbed Moonstone Sleet, which has been actively targeting various sectors with ransomware and custom malware. This group, previously tracked as Storm-1789, has distinguished itself from other North Korean threat actors by developing its own infrastructure and employing sophisticated social engineering\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"moonstone sleet","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/Moonstone-sleet-featured.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/Moonstone-sleet-featured.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/Moonstone-sleet-featured.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/Moonstone-sleet-featured.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/05\/Moonstone-sleet-featured.webp?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":14476,"url":"https:\/\/msftnewsnow.com\/microsoft-advertising-releases-maximum\/","url_meta":{"origin":332376,"position":5},"title":"Boost your search campaign results with Microsoft Advertising&#8217;s new Maximize Conversion Value strategy &#8211; April 2024 update","author":"Dave W. Shanahan","date":"April 3, 2024","format":false,"excerpt":"Microsoft Advertising has announced a significant update to its platform, aimed at helping advertisers drive more results with less effort.","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/msftnewsnow.com\/news\/"},"img":{"alt_text":"microsoft advertising","src":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/04\/blog-19038-hero-833x469-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/04\/blog-19038-hero-833x469-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/04\/blog-19038-hero-833x469-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/msftnewsnow.com\/wp-content\/uploads\/2024\/04\/blog-19038-hero-833x469-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/332376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/users\/208461344"}],"replies":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/comments?post=332376"}],"version-history":[{"count":0,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/posts\/332376\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media\/332416"}],"wp:attachment":[{"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/media?parent=332376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/categories?post=332376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/msftnewsnow.com\/wp-json\/wp\/v2\/tags?post=332376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}