Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

'Jingle Thief' Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

0
Medium
Phishing
Published: Thu Oct 23 2025 (10/23/2025, 07:52:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated with organizations in the retail and consumer services sectors for gift card fraud. "Jingle Thief attackers use phishing and smishing to steal credentials, to compromise organizations that issue gift cards," Palo Alto Networks Unit 42 researchers

AI-Powered Analysis

AILast updated: 10/24/2025, 01:01:17 UTC

Technical Analysis

Jingle Thief is a financially motivated cybercriminal group active since at least late 2021, specializing in exploiting cloud infrastructure to perpetrate gift card fraud. Their primary attack vector involves highly targeted phishing and smishing campaigns designed to harvest Microsoft 365 credentials from employees of retail and consumer service organizations that issue gift cards. After credential compromise, the attackers gain unauthorized access to cloud environments, including SharePoint and OneDrive, to gather sensitive operational and financial information, such as gift card issuance workflows, VPN configurations, and internal tracking systems. They then escalate privileges and move laterally within the cloud infrastructure to access gift card issuance applications, issuing high-value gift cards fraudulently. The group employs stealth techniques such as creating inbox rules to forward emails to attacker-controlled addresses, deleting sent emails to erase traces, and registering rogue authenticator apps to bypass multi-factor authentication. They also enroll devices in Entra ID to maintain persistent access despite password resets or token revocations. Unlike traditional malware-based attacks, Jingle Thief relies on identity theft and cloud service abuse, which reduces detection likelihood. Their operations are timed to coincide with festive seasons, maximizing financial gain. The group has been linked with Moroccan criminal entities Atlas Lion and Storm-0539 and has demonstrated the ability to maintain access for extended periods, sometimes up to 10 months within a single organization, compromising dozens of user accounts. The stolen gift cards are likely monetized through gray markets, exploiting the inherent difficulties in tracing gift card fraud. This threat highlights the risks associated with cloud-based identity and access management weaknesses, especially in organizations heavily reliant on Microsoft 365 and cloud gift card issuance systems.

Potential Impact

European organizations in the retail and consumer services sectors face significant financial losses due to fraudulent issuance of gift cards, which can be redeemed with minimal personal information and are difficult to trace. The stealthy nature of the attacks, including MFA bypass and persistent access, increases the risk of prolonged undetected fraud, potentially leading to millions in losses. The compromise of internal communications and operational workflows can also expose sensitive business information, increasing reputational damage and regulatory risks under GDPR. The use of cloud infrastructure and Microsoft 365 environments means that organizations with heavy cloud adoption are particularly vulnerable. The threat actor’s ability to move laterally and maintain long-term access complicates incident response and remediation efforts. Additionally, internal phishing propagation can lead to broader organizational compromise, affecting operational continuity. The timing of attacks around holiday seasons can exacerbate financial impact due to increased gift card usage and reduced staffing for incident response. Overall, the threat undermines trust in digital gift card systems and cloud security postures, necessitating enhanced security controls and monitoring.

Mitigation Recommendations

1. Implement advanced phishing detection and user awareness training tailored to recognize highly targeted and personalized phishing and smishing attempts, especially those mimicking IT service notifications. 2. Enforce strict conditional access policies in Microsoft 365, including blocking legacy authentication protocols and limiting access based on device compliance and location. 3. Deploy continuous monitoring and anomaly detection for unusual mailbox rules, email forwarding, and authenticator app registrations to detect stealthy persistence mechanisms. 4. Regularly audit and restrict permissions related to gift card issuance applications and workflows, applying the principle of least privilege. 5. Use Microsoft Defender for Identity and Cloud App Security to detect lateral movement and reconnaissance activities within cloud environments. 6. Enforce strong multi-factor authentication methods resistant to rogue authenticator app registrations, such as hardware security keys with phishing-resistant protocols. 7. Conduct regular reviews and revocation of enrolled devices in Entra ID to prevent unauthorized persistent access. 8. Implement segmentation and isolation of gift card issuance systems from general cloud environments to limit lateral movement. 9. Maintain comprehensive logging and retention policies to support forensic investigations, ensuring logs are protected from tampering. 10. Establish incident response playbooks specifically addressing cloud identity compromise and gift card fraud scenarios to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/10/jingle-thief-hackers-exploit-cloud.html","fetched":true,"fetchedAt":"2025-10-24T01:00:05.487Z","wordCount":1361}

Threat ID: 68facf9f00e9e97283b112ec

Added to database: 10/24/2025, 1:00:15 AM

Last enriched: 10/24/2025, 1:01:17 AM

Last updated: 10/30/2025, 1:37:43 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats