Description

Cybersecurity researchers from Palo Alto Networks have uncovered a threat actor dubbed "Jingle Thief," known for targeting cloud environments in retail and consumer services to commit large-scale gift card fraud. Using phishing and smishing techniques, the attackers steal credentials to infiltrate organizations that issue gift cards. Once inside, they seek elevated access to generate unauthorized cards, which are then likely resold on gray markets. Gift cards are attractive targets due to their ease of redemption and low traceability, making them ideal for monetization with minimal risk. The group’s name reflects its seasonal activity, often coinciding with holidays. Tracked under the identifier CL?CRI?1032, Jingle Thief is believed to be linked to criminal groups Atlas Lion and Storm-0539, with origins in Morocco. Active since late 2021, the group has demonstrated persistence, maintaining access to compromised environments for months. In one campaign, they breached 60 user accounts within a single organization over a 10-month period. Their operations involve deep reconnaissance, lateral movement across cloud infrastructure, and stealth tactics to avoid detection. Jingle Thief’s attack chain is highly tailored, beginning with reconnaissance followed by phishing emails or SMS messages that mimic Microsoft 365 login pages. Once credentials are harvested, attackers scour SharePoint and OneDrive for sensitive data, including gift card workflows, VPN guides, and IT documentation. They then use compromised accounts to send internal phishing emails, mimicking IT service alerts to expand their reach. Inbox rules are created to forward emails and erase traces of activity. To maintain access, the group registers rogue authenticator apps and enrolls devices in Entra ID, bypassing MFA even after password resets. Their preference for identity misuse over malware deployment allows them to operate discreetly, exploiting cloud-based systems with speed and scalability.