Microsoft Threat Intelligence Podcast

Unpacking the Latest Threats Targeting the Financial Services Industry

Feb 11, 2026
Anna Seitz, a Microsoft researcher tracking financial‑services threats, and Megan Stalling, a researcher focused on intrusion tradecraft, unpack actor tactics. They describe Storm‑0727’s use of maldocs, credential theft and living‑off‑the‑land scripts. The conversation covers BEC, ransomware with data extortion, phishing‑as‑a‑service, social engineering, and why simple techniques remain effective.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Low-Noise Attacks Win Big

  • Storm-0727 uses ordinary-looking financial lures and macro-enabled documents to gain quiet footholds.
  • They rely on simple, low-noise techniques like VBScript and browser credential theft to maintain persistence.
INSIGHT

Credential Theft For Stealthy Persistence

  • After macros run, Storm-0727 stays quiet and uses VBScript to steal browser credentials.
  • This lets them blend with normal admin activity and avoid noisy detections.
ANECDOTE

Odd Domain Choices Reveal Actor Habits

  • Storm-0727 consistently registers domains with Namecheap using TLDs like .site, .store, and .lol.
  • The chosen names often look unrelated or random, making attribution and intent guesses harder.
Get the Snipd Podcast app to discover more snips from this episode
Get the app