Skip to main content

Virtual Infrastructure Abuse leads to SaaS Hijacks

Medium
Published: Wed Aug 27 2025 (08/27/2025, 16:22:16 UTC)
Source: AlienVault OTX General

Description

This analysis examines a series of coordinated SaaS account compromises across multiple customer environments, involving suspicious logins from VPS-linked infrastructure followed by unauthorized inbox rule creation and deletion of phishing-related emails. The attackers leveraged virtual private servers (VPS) from providers like Hyonix to bypass geolocation-based defenses, evade IP reputation checks, and blend into legitimate traffic. Key tactics included session hijacking, inbox rule manipulation, and attempts to modify account recovery settings. The incidents highlight the growing abuse of VPS infrastructure in stealthy, scalable attacks targeting SaaS platforms.

AI-Powered Analysis

AILast updated: 08/27/2025, 19:48:29 UTC

Technical Analysis

The threat campaign titled "Virtual Infrastructure Abuse leads to SaaS Hijacks" involves a coordinated series of compromises targeting SaaS accounts across multiple customer environments. Attackers exploit virtual private servers (VPS) infrastructure, notably from providers such as Hyonix, to conduct suspicious logins that bypass traditional security controls like geolocation-based defenses and IP reputation checks. By leveraging VPSs, attackers blend malicious traffic with legitimate activity, making detection more difficult. The core tactics observed include session hijacking, where attackers take over active user sessions to gain unauthorized access; manipulation of inbox rules to automatically redirect, delete, or hide phishing-related emails, thereby evading user and security team detection; and attempts to modify account recovery settings to maintain persistent access and hinder victim recovery efforts. These tactics align with MITRE ATT&CK techniques such as T1566.001 (Phishing: Spearphishing Attachment), T1071 (Application Layer Protocol), T1562 (Impair Defenses), T1036 (Masquerading), T1087 (Account Discovery), T1098 (Account Manipulation), T1078 (Valid Accounts), and others, indicating a sophisticated multi-stage attack chain. The attackers’ use of VPS infrastructure allows scalable, stealthy operations that can target multiple SaaS platforms simultaneously. Indicators of compromise include a set of IP addresses linked to VPS providers, which have been used in suspicious login attempts. Although no specific CVE or patch is associated, the campaign highlights an evolving threat landscape where attackers exploit cloud and virtual infrastructure to bypass conventional security controls and achieve SaaS account hijacking.

Potential Impact

For European organizations, this threat poses significant risks due to the widespread adoption of SaaS platforms for critical business operations, including email, collaboration, and customer relationship management. Successful account hijacking can lead to unauthorized data access, leakage of sensitive information, disruption of business communications, and facilitation of further phishing attacks within or outside the organization. The manipulation of inbox rules and deletion of phishing emails can delay detection and response, increasing the window of exposure. Additionally, modification of account recovery settings can lock out legitimate users, complicating incident response and recovery efforts. Given the reliance on SaaS in sectors such as finance, healthcare, and government across Europe, the threat could lead to regulatory compliance violations (e.g., GDPR breaches), reputational damage, and financial losses. The use of VPS infrastructure to evade IP-based defenses challenges traditional perimeter security models common in European enterprises, necessitating enhanced detection capabilities.

Mitigation Recommendations

European organizations should implement multi-layered defenses tailored to counter VPS-based SaaS hijacking attacks. Specific recommendations include: 1) Enforce strong multi-factor authentication (MFA) on all SaaS accounts, preferably using hardware tokens or app-based authenticators rather than SMS, to reduce the risk of session hijacking and credential theft. 2) Deploy anomaly detection systems that monitor login patterns for unusual IP addresses, especially those associated with known VPS providers like Hyonix, and flag or block suspicious sessions. 3) Regularly audit and monitor mailbox rules and account recovery settings for unauthorized changes, employing automated alerts to detect suspicious modifications promptly. 4) Integrate threat intelligence feeds containing indicators of compromise (e.g., the listed IP addresses) into security information and event management (SIEM) systems to enhance detection of VPS-originated malicious activity. 5) Conduct user awareness training focused on recognizing phishing attempts and the risks of session hijacking. 6) Implement conditional access policies that restrict SaaS access based on device compliance, geolocation, and risk scores to limit exposure from VPS-originated logins. 7) Establish rapid incident response procedures to investigate and remediate compromised accounts, including forced password resets and revocation of active sessions. 8) Collaborate with SaaS providers to leverage their native security features and incident response support. These targeted measures go beyond generic advice by focusing on the unique aspects of VPS abuse and inbox rule manipulation in SaaS environments.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.darktrace.com/blog/from-vps-to-phishing-how-darktrace-uncovered-saas-hijacks-through-virtual-infrastructure-abuse"]
Adversary
null
Pulse Id
68af30b8ad63da53c79e90c1
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip51.36.233.224
ip103.131.131.44
ip103.211.53.84
ip178.173.244.27
ip194.49.68.244
ip38.240.42.160
ip38.255.57.212
ip50.229.155.2

Threat ID: 68af5d62ad5a09ad0065ab75

Added to database: 8/27/2025, 7:32:50 PM

Last enriched: 8/27/2025, 7:48:29 PM

Last updated: 8/30/2025, 1:53:34 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats