
CyberWire Daily Inside Jingle Thief Cloud Fraud Unwrapped [Threat Vector]
Nov 21, 2025
In this engaging discussion, Stav Setty, a Principal Researcher at Palo Alto Networks, unveils the alarming tactics behind the Jingle Thief campaign, a sophisticated cloud-only fraud operation leveraging Microsoft 365 to print gift cards. Setty reveals how the Moroccan group Atlas Lion used tailored phishing methods and exploited legitimate business workflows to compromise identities. He emphasizes the importance of behavioral analytics in detecting such threats and offers actionable advice to enhance identity security in cloud environments.
AI Snips
Chapters
Transcript
Episode notes
Cloud-Only Gift Card Operation
- Stav Setty describes Jingle Thief as a cloud-only campaign stealing gift cards via Microsoft 365.
- The attackers lived entirely in the cloud with no malware or exploits involved.
Gift Cards As Digital Cash
- Gift cards act as untraceable digital cash that attackers can resell on underground markets.
- Stav Setty explains gift cards' lack of traceability makes them ideal for monetization.
Harden Phishing And URL Defenses
- Monitor and harden phishing vectors because attackers used highly tailored phishing and smishing pages.
- Detect URL tricks like the at-sign trick and block or warn on suspicious redirect patterns.
