<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>RiskInsight</provider_name><provider_url>https://www.riskinsight-wavestone.com/en/</provider_url><title>Subscription hijacking&#xA0;on&#xA0;Microsoft&#xA0;Azure&#xA0; - RiskInsight</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="jhyJBcdpke"&gt;&lt;a href="https://www.riskinsight-wavestone.com/en/2026/03/subscription-hijacking-on-microsoft-azure/"&gt;Subscription hijacking&#xA0;on&#xA0;Microsoft&#xA0;Azure&#xA0;&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.riskinsight-wavestone.com/en/2026/03/subscription-hijacking-on-microsoft-azure/embed/#?secret=jhyJBcdpke" width="600" height="338" title="&#x201C;Subscription hijacking&#xA0;on&#xA0;Microsoft&#xA0;Azure&#xA0;&#x201D; &#x2014; RiskInsight" data-secret="jhyJBcdpke" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.riskinsight-wavestone.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Image5.png</thumbnail_url><thumbnail_width>726</thumbnail_width><thumbnail_height>484</thumbnail_height><description>Subscription hijacking is a cloud attack first identified on Microsoft Azure: it consists of an attacker successfully transferring an Azure subscription from its original Azure organization to an organization under malicious control. This attack allows the attacker to take full control of the subscription and its content and even continue billing the original organization for their use of the stolen subscription.</description></oembed>
