Atlas Lion: Tactics, History & Defenses

April 29, 2026

tl;dr

  • Threat Actor: Atlas Lion, Storm-0539, THIRSTY CAMELS
  • Motivation: Financial gain (i.e., gift card fraud)
  • Targeting: Azure and M365 environments, Retail, Hospitality, and North America
  • Attack Types: AiTM Phishing, Rogue Device Registration, Cloud Infrastructure Discovery, and Exploitation of Process and Procedure 
  • Defenses: Phishing-Resistant MFA, Conditional Access Policies (Managed Devices), and Fraud Transaction Auditing

Build your muscle memory before the breach.

Validate your cloud IR skills against AiTM phishing and other Atlas Lion techniques in CloudLabs now.

Launch CloudLabs →

Overview

Atlas Lion - Threat Actor Card

Atlas Lion is a financially motivated cybercrime threat actor that has been active since at least 2024. The threat actor is known to find and exploit credentials and use those stolen identities to infiltrate enterprise cloud systems, mostly Microsoft Azure and M365 environments. Once inside, they conduct extensive recon of the business's gift card systems, policies and departments. Their ultimate goal is to use the acquired access and knowledge to issue gift cards, which has reportedly reached up to $100,000 a day in fraudulent cards. 

Initial access is typically achieved through targeted smishing or phishing campaigns impersonating internal IT or helpdesk communications. Victims are lured to convincing phishing pages that harvest credentials, inclusive of valid MFA codes or cookie sessions, enabling the threat actor to authenticate in real time. In several observed cases, Atlas Lion used this access to register their own devices as trusted assets and spin up virtual machines for persistence and staging of later attack chain tactics. This allows the group to operate from infrastructure that appears compliant and corporate-owned, reducing the likelihood of immediate detection.

With persistent access established, Atlas Lion conducts internal reconnaissance focused on business processes rather than reliance on malware or further lateral movement. The group searches internal documentation, SharePoint sites, and knowledge bases to identify gift card issuance systems, approval workflows, and fraud controls. Once these processes are understood, the threat actor moves to fraud execution For example, if a limit is $100,000, the threat actor will issue a card for $99,000 then send themselves the gift card code and monetize them by selling them online at a discounted rate.

CISO Perspective

Atlas Lion highlights a shift toward threat actors operating as legitimate users by abusing cloud identities and device enrollment to blend into trusted environments and target high-value business processes. These techniques bypass traditional defenses, making misuse of legitimate access difficult to detect. 

To counter these threats, retail and gift card organizations should prioritize security assessments focused on identity and device integrity. Rapid forensic detection is essential to identifying and neutralizing cloud-based abuse at its earliest stages.

TTPs

All of the details below are also available in our GitHub repository, which provides background on each observed technique along with corresponding MITRE ATT&CK mappings, making it easy to map these insights directly to your cloud logs.

MITRE ATT&CK Mapping

TacticTechniqueMITRE IDProcedure (Context)
Resource DevelopmentAcquire Infrastructure: DomainsT1583.001Created 200+ domains mimicking Okta, ServiceNow, etc. Used typosquatting and cPanel takeovers of WordPress sites.
Resource DevelopmentAcquire Infrastructure: VPST1583.003Rented VPSs via SERVERCENTRAL, DIALHOST, and ZAM LTDA ASNs to host phishing infrastructure.
Resource DevelopmentAcquire Infrastructure: Server (Cloud)T1583.004Used free-trial and pay-as-you-go cloud accounts to spin up VMs for attack infrastructure.
Resource DevelopmentEstablish AccountsT1585Impersonated US nonprofits using spoofed websites and real IRS 501(c)(3) letters to get sponsored cloud resources.
Resource DevelopmentObtain Capabilities: ToolT1588.002Utilized Gophish and custom AiTM kits themed after Okta, Microsoft, Salesforce, and Telegram.
Initial AccessPhishing (Smishing)T1566Targeted work/personal phones via SMS. Used compromised internal distribution lists to send phishing from trusted addresses.
Initial AccessAdversary-in-the-Middle (AiTM)T1557Proxy pages captured credentials and session tokens in real-time, relaying auth to legitimate services to bypass MFA.
Credential AccessSteal Web Session CookieT1539Intercepted MFA session cookies from identity providers to enable account takeover without MFA codes.
Credential AccessModify Auth Process: MFAT1556.006Registered actor-controlled devices to victim accounts so MFA prompts were routed to the attacker.
PersistenceAccount Manipulation: Device RegistrationT1098.005Registered own devices to Entra ID environments to maintain access that survives password resets.
DiscoveryAccount DiscoveryT1087Researched gift card issuance processes, internal guides, and specific employees with portal access.
DiscoveryCloud Infrastructure DiscoveryT1580Mapped VMs, VPNs, SharePoint/OneDrive, Salesforce, and Citrix environments post-compromise.
DiscoveryCloud Service DiscoveryT1526Researched federated identity providers to convincingly replicate sign-in flows.
Lateral MovementRemote Services: SSHT1021.004Stole SSH keys and passwords from compromised accounts to pivot toward gift card systems.
Lateral MovementValid Accounts: Cloud AccountsT1078.004Used legitimate compromised employee cloud accounts to access business processes and gift card portals.
ImpactFinancial TheftT1657Fraudulently generated gift cards (up to $100K/day). Cards sold on the dark web or cashed out via money mules.

Incident Response Steps

Here are several practical, universal, and high-impact steps to prepare for and respond to cloud-based attacks, including the TTPs mentioned above (this list isn’t exhaustive, but it highlights key areas where defenders can focus their efforts):

  • Phishing-Resistant MFA: Transition phishing resistant MFA solutions to negate Adversary-in-the-Middle (AiTM) attacks.
  • Conditional Access Policies: Implement compliant device requirements, ensuring only company-managed hardware can access sensitive gift card portals. Furthermore, systems used for issuing gift cards should only be accessible via allowlisted IP addresses.
  • Log Aggregation: Ensure UserLoggedIn, TokenIssuedAtTime, and MailboxLogin events are being ingested into a SIEM for long-term retention (e.g., 180+ days).
  • Identify Impossible Travelers: Use identity protection, while also alerting on logins from geographically distant locations within a short timeframe (e.g., a login from Atlanta and Morocco 20 minutes apart).
  • Audit Managed Devices: Regularly check for newly registered or unknown devices in Microsoft Entra ID or similar cloud console.
  • Audit VMs: Regularly review existing and newly created VMs as a potential indicator of a threat actor using resources for later stage attacks.
  • Revoke Tokens: Simply changing a password is not enough. You must revoke all active sessions to force the threat actor's stolen token to expire.
  • Remediate Rogue Devices: Remove any unauthorized devices registered by the threat actor to prevent them from re-authenticating.
  • Gift Card Audit: Contact the gift card service provider or department to freeze and void any high-value cards issued during the window of compromise.
  • Identity Proofing: Require the affected employee to verify their identity via a secondary, out-of-band channel (like a video call) before restoring full access.

For additional security considerations and detection queries, see Microsoft’s “Into the Lion’s Den and Intel471’s “Threat Actors Target Gift Card Issuing Systems.”

Next Steps 

If you spot any of these TTPs or indicators in your environment, or just want to become incident-ready in the cloud, contact our team. We’ll help you tighten your Azure, M365 or Entra defenses, refine your IR runbook, and stay ahead of Atlas Lion or other cloud-focused adversaries.

About Invictus Incident Response

We are an incident response company and we ❤️ the cloud and specialize in supporting organizations in preparing and responding to a cyber attack. We help our clients stay undefeated!

🆘 Incident Response support reach out to cert@invictus-ir.com or go to https://www.invictus-ir.com/24-7