×
Microsoft Exposes Global Cybercrime Network Exploiting AI Services


Recently, Microsoft has exposed a sophisticated cybercrime network accused of hijacking AI services to create and distribute harmful content. Known as LLMjacking, this operation involved unauthorized access to generative AI tools—including Microsoft's Azure OpenAI Service—to bypass safety protocols and generate offensive material.

Microsoft has been tracking this cybercriminal syndicate under the codename Storm-2139 and has now identified four key individuals allegedly at the heart of the scheme:

🔹 Arian Yadegarnia ("Fiz") – Iran
🔹 Alan Krysiak ("Drago") – United Kingdom
🔹 Ricky Yuen ("cg-dot") – Hong Kong, China
🔹 Phát Phùng Tấn ("Asakuri") – Vietnam

 

How the Attack Worked

According to Steven Masada, assistant general counsel for Microsoft's Digital Crimes Unit (DCU), Storm-2139 members scraped customer credentials from public sources to infiltrate AI-powered platforms. They then manipulated these services, reselling unauthorized access to cybercriminals and offering step-by-step guides on how to generate harmful and illicit content.

What was their aim? To override AI safety controls and mass-produce illegal synthetic content, including non-consensual deepfake images of celebrities and explicit material.

 

A Major Crackdown

Microsoft isn't just exposing these actors—it’s taking legal action. The company has already obtained a court order to seize a key website, "aitism[.]net," which played a pivotal role in Storm-2139’s criminal enterprise.

 

A Criminal Hierarchy

Storm-2139 operates in a structured three-tier system:

🔹 Creators – The masterminds who build illicit AI-abuse tools.
🔹 Providers – Individuals who modify and sell these tools at various price points.
🔹 End Users – Customers who use the tools to generate content violating Microsoft’s Acceptable Use Policy and Code of Conduct.

Microsoft has also flagged two additional actors based in the United States, whose names are being withheld pending potential criminal investigations. But that’s not all—the company has identified more than a dozen other individuals worldwide involved in this cyber scheme, including:

🔹 John Doe (DOE 2) – Likely in the U.S.
🔹 John Doe (DOE 3) ("Sekrit") – Austria
🔹 "Pepsi"United States
🔹 "Pebble"United States
🔹 "Dazz"United Kingdom
🔹 "Jorge"United States
🔹 "Jawajawaable"Turkey
🔹 "1phlgm"Russia
🔹 John Doe (DOE 8)Argentina
🔹 John Doe (DOE 9)Paraguay
🔹 John Doe (DOE 10)Denmark

 

Fighting Back Against AI Misuse

Microsoft warns that AI-driven cybercrime is on the rise, requiring relentless monitoring and enforcement.

"Going after malicious actors requires persistence and ongoing vigilance," Masada emphasized. "By unmasking these individuals and shining a light on their malicious activities, Microsoft aims to set a precedent in the fight against AI technology misuse."

With cybercriminals evolving their tactics, the battle to protect AI services is far from over. Microsoft’s crackdown on Storm-2139 sends a clear message: AI abuse won’t go unchecked.

Here are Pyralink we are ready to help your organization secure it defense against such cybercriminals. Get in touch with us now so that we can secure your AI assets.

×