Blog Post

Microsoft Defender for Cloud Blog
10 MIN READ

Key findings from product telemetry: top storage security alerts across industries

Thomas_Zou's avatar
Thomas_Zou
Icon for Microsoft rankMicrosoft
Dec 01, 2025

1.0 Introduction

Cloud storage stands at the core of AI-driven applications, making its security more vital than ever. As generative AI continues to drive innovation, protecting the storage infrastructure becomes central to ensuring both the reliability and safety of AI solutions.
Every industry encounters its own set of storage security challenges. For example, financial services must navigate complex compliance requirements and guard against insider risks. Healthcare organizations deal with the protection of confidential patient information (e.g. electronic medical records), while manufacturing and retail face the complexities of distributed environments and vulnerable supply chains.
At Microsoft, we leverage product telemetry to gain insight into the most frequent storage security alerts and understand how risks manifest differently across various customer sectors.
This article delves into how storage threats are shaped by industry dynamics, drawn on data collected from our customer base to illustrate emerging patterns and risks.

Acknowledgement:

This blog represents the collaborative work of the following Stroage security in MDC v-team members:

  • Fernanda Vela and Alex Steele, for initiating the project and preparing the initial draft and directing the way we tell the story
  • Eitan Bremler and Lior Tsalovich, for product and customer insights, synthesizing product telemetry and providing review
  • Yuri Diogenes, for his supervision, review and cheerleading

We extend our sincere appreciation to each contributor for their dedication and expertise.

1.1 Key findings from product telemetry: Top storage security alerts across industries

Based on telemetry gathered from Microsoft Defender for Cloud, certain alerts consistently emerge as the most prevalent across different sectors. These patterns highlight the types of threats and suspicious activities organizations encounter most frequently, reflecting both industry-specific risks and broader attack trends. In the section that follows, this information is presented in detail, offering a breakdown of the most common alerts observed within each industry and providing valuable insight into how storage environments are being targeted and defended.

1.1.1 How does storage security alert in Defender for Cloud work

To protect storage accounts from threats, Microsoft Defender for Cloud storage security provides a wide range of security alerts designed to detect suspicious, risky, or anomalous activity across Azure Storage services such as Blob Storage, Data Lake Gen2, and Azure Files.
These alerts cover scenarios like unauthorized access attempts, abnormal usage patterns, potential data exfiltration, malware uploads or downloads, sensitive data exposure and changes that may expose storage containers to the public. They leverage threat intelligence and behavioral analytics to identify activity from malicious IPs, unusual geographies, or suspicious applications, ensuring organizations are alerted when their storage environment is potentially at risk.
Each alert is categorized by severity, helping organizations prioritize responses to the most critical threats, such as confirmed malware or credential compromise, while also surfacing medium and low-risk anomalies that may indicate early stages of an attack. Overall, Defender for Storage enables proactive monitoring and rapid detection of threats to cloud storage, reducing the risk of exposure, misuse, or compromise of valuable data assets.

1.1.2 Top alert types for major industries

Financial, healthcare, technology, energy and manufacturing are often cited as the most targeted industries because of the value of their data, regulatory exposure and their role in critical infrastructure.
Our telemetry from Microsoft Defender for Cloud (MDC) shows the top security alerts in storage resources across these five industries:

  • Finance industry

 

  • Health care industry

 

  • Manufacturing industry

 

  • Software industry

 

  • Energy industry

1.1.3 Top 9 alerts across industries

Across industries, the most common alert—averaging 1,300 occurrences per month—is “Unusual application accessed a storage account,” indicating unexpected access to a storage account. Below are the top cross-industry alerts based on this analysis.

1.2 Analysis

Application Anomaly Alerts


Ranking: #1 across all industries (Finance, Manufacturing, Software, Energy, Healthcare)
Alert: Access from a suspicious application (Storage.Blob_ApplicationAnomaly)
Why it happens:
Organizations increasingly use automation, third-party integrations, and custom scripts to interact with cloud storage.
Shadow IT and lack of centralized app governance lead to unexpected access patterns.
In sectors like healthcare and finance, sensitive data attracts attackers who may use compromised or malicious apps to probe for weaknesses.
Interpretation:
High prevalence indicates a need for stricter application registration, monitoring, and access controls.
Industries should prioritize visibility into which apps are accessing storage and enforce policies to block unapproved applications.

Geo-Anomaly Alerts


Ranking: #2 or #3 in most industries
Alert: Access from an unusual location (Storage.Blob_GeoAnomaly, Storage.Files_GeoAnomaly)
Why it happens:
Global operations, remote work, and distributed teams are common in energy, manufacturing, and healthcare.
Attackers may use VPNs or compromised credentials to access storage from unusual regions.
Interpretation:
Frequent geo-anomalies suggest gaps in geo-fencing and conditional access policies.
Organizations should review access logs, enforce region-based restrictions, and monitor cross-border data flows.

Malware-Related Alerts


Ranking: Prominent in healthcare, finance, and software sectors
Alert:
Malware found in blob (Storage.Blob_AM.MalwareFound)
Malware download detected (Storage.Blob_MalwareDownload)
Access from IP with suspicious file hash reputation (Storage.Blob_MalwareHashReputation)
Why it happens:
High-value data and frequent file exchanges make these industries attractive targets for ransomware and malware campaigns.
Insufficient scanning capacity or delayed remediation can allow malware to persist.
Interpretation:
Rising malware alerts point to active threat campaigns and the need for real-time scanning and automated remediation.
Industries should scale up Defender capacity, integrate threat intelligence, and enable automatic malware removal.

Open Container Scanning Alerts

Ranking: More frequent in energy and manufacturing
Alerts:
Successful discovery of open storage containers (Storage.Blob_OpenContainersScanning.SuccessfulDiscovery)
Failed attempt to scan open containers (Storage.Blob_OpenContainersScanning.FailedAttempt)
Why it happens:
Rapid cloud adoption and operational urgency can lead to misconfigured storage containers.
Legacy systems and lack of automated policy enforcement increase exposure risk.
Interpretation:
High rates of open container alerts signal the need for regular configuration audits and automated security policies.
Organizations should prioritize closing public access and monitoring for changes in container exposure.

Anonymous Access & Data Exfiltration Alerts

Ranking: Present across industries, especially where sensitive data is stored
Alerts:
Anonymous access anomaly detected (Storage.Blob_AnonymousAccessAnomaly)
Data exfiltration detected: unusual amount/number of blobs (Storage.Blob_DataExfiltration.AmountOfDataAnomaly, Storage.Blob_DataExfiltration.NumberOfBlobsAnomaly)
Why it happens:
Attackers may attempt to access data anonymously or exfiltrate large volumes of data.
Weak access controls or lack of monitoring can enable these behaviors.
Interpretation:
These alerts should trigger immediate investigation and remediation.
Organizations must enforce strict access controls and monitor for abnormal data movement.

Key Takeaways Across Industries
Application anomaly and geo-anomaly alerts are universal, reflecting the challenges of managing automation and global access in modern cloud environments.
Malware-related alerts are especially critical in sectors handling sensitive or regulated data, indicating active targeting by threat actors.
Open container and capacity alerts reveal operational and configuration risks, often tied to rapid scaling and cloud adoption.
Interpreting these trends:
High alert shares for specific patterns should drive targeted investments in security controls, monitoring, and automation.
Industries must adapt their security strategies to their unique risk profiles, balancing innovation with robust protection.

1.3 Protect storage accounts from threats

To address these challenges, Microsoft Defender for Cloud Storage Security offers:

  • Real-time monitoring of storage-related threats: Identifies unusual access patterns with direct integration with Azure.
  • Detect and mitigate with threat intelligence: understand threat context and reduce false positives.
  • Integration with Defender XDR: Provides unified threat correlation, investigation and triaging with industry leading SIEM integration.

2.0 Malware in Storage: A Growing Threat

Based on the findings from section 1, let’s analyze which industry receives the most amount of malware related threats:

2.1 Top Findings

Healthcare:
Malware found in blob (8.6%)
Malware download detected (5.5%)
Malware hash reputation (4.6%)
Total malware-related share: ~18.7%

Finance:
Malware found in blob (4.5%)
Malware download detected (3.9%)
Malware hash reputation (4.6%)
Total malware-related share: ~13%

Manufacturing:
Malware found in blob (8.5%)
Malware download detected (2.7%)
Malware hash reputation (3.3%)
Total malware-related share: ~14.5%

Software:
Malware found in blob (7.8%)
Malware download detected (5.9%)
Malware hash reputation (15.6%)
Total malware-related share: ~29.3% (notably high due to hash reputation alert)

Energy:
Malware hash reputation (4.2%)
Malware found in blob (not top 7)
Malware download detected (not top 7)
Total malware-related share: ~4.2% (lower than other sectors)

2.2 Analysis

Software industry has the highest ranked malware alerts, especially due to a very high share for “Malware hash reputation” (15.6%) and significant shares for “Malware found in blob” and “Malware download detected.” Healthcare also has a high combined share of malware alerts, but not as high as software. Finance, Manufacturing, and Energy have lower shares for malware alerts compared to software and healthcare.

How to Read This Trend

  • Software companies are likely targeted more for malware due to their high volume of code, frequent file exchanges, and integration with many external sources.
  • Healthcare is also a prime target because of sensitive patient data (e.g. electronic medical records) and regulatory requirements.
  • If your organization is in software or healthcare, pay extra attention to malware scanning, automated remediation, and threat intelligence integration. Regularly review and update malware protection policies.

2.3 How Microsoft Helps Prevent Malware Spread

Defender for Cloud mitigates these risks by:

  • Scanning for malicious content on upload or on demand, in storage accounts
  • Automatic remediation after suspicious uploads
  • Integrating with threat intelligence for threat context correlation, advance investigation and threat response.

To learn more about Malware Scanning in Defender for Cloud, visit: Introduction to Defender for Storage malware scanning - Microsoft Defender for Cloud | Microsoft Learn

3.0 Conclusion

As cloud and AI adoption accelerate, storage security is now essential for every industry. Microsoft Defender for Cloud storage security telemetry shows that the most frequent alerts—like suspicious application access, geo-anomalies, and malware detection—reflect both evolving threats and the realities of modern operations.
These trends highlight the need for proactive monitoring, and strong threat detection and mitigation. Defender for Cloud helps organizations stay ahead of risks, protect critical data, and enable safe innovation in the cloud.

Learn more about Defender for Cloud storage security:
Microsoft Defender for Cloud | Microsoft Security
Start a free Azure trial.

Read more about Microsoft Defender for Cloud Storage Security here.

4.0 Appendix: Detailed Data for Top Industry-Specific Alerts

4.1 Finance Industry

Alert TypeTagDescriptionShare (%)
Access from a suspicious applicationStorage.Blob_ApplicationAnomalyBlob accessed using a suspicious/uncommon application34.40
Access from an unusual locationStorage.Blob_GeoAnomalyBlob accessed from a geographic location that deviates from typical patterns23.10
Access from an unusual location (Azure Files)Storage.Files_GeoAnomalyAzure Files share accessed from an unexpected geographic region7.90
Access from a suspicious application (Files)Storage.Files_ApplicationAnomalyAzure Files share accessed using a suspicious application7.80
Failed attempt to scan open containersStorage.Blob_OpenContainersScanning.FailedAttemptFailed attempt to scan publicly accessible containers for security risks6.40
Access from IP with suspicious file hashStorage.Blob_MalwareHashReputationBlob accessed from an IP with known malicious file hashes4.60
Malware found in blobStorage.Blob_AM.MalwareFoundMalware detected within a blob during scanning4.50
Malware download detectedStorage.Blob_MalwareDownloadBlob download activity suggests malware distribution3.90
Anonymous access anomaly detectedStorage.Blob_AnonymousAccessAnomalyBlob accessed anonymously in an abnormal way3.30
Data exfiltration: unusual amount of dataStorage.Blob_DataExfiltration.AmountOfDataAnomalyLarge volume of data accessed/downloaded, possible exfiltration2.20

4.2 Healthcare Industry

Alert TypeTagDescriptionShare (%)
Access from a suspicious applicationStorage.Blob_ApplicationAnomalyBlob accessed using a suspicious/uncommon application42.40
Access from an unusual locationStorage.Blob_GeoAnomalyBlob accessed from a geographic location that deviates from typical patterns17.10
Access from a suspicious application (Files)Storage.Files_ApplicationAnomalyAzure Files share accessed using a suspicious application9.70
Malware found in blobStorage.Blob_AM.MalwareFoundMalware detected within a blob during scanning8.60
Access from an unusual location (Files)Storage.Files_GeoAnomalyAzure Files share accessed from an unexpected geographic region8.20
Malware download detectedStorage.Blob_MalwareDownloadBlob download activity suggests malware distribution5.50
Access from IP with suspicious file hashStorage.Blob_MalwareHashReputationBlob accessed from an IP with known malicious file hashes4.60
Failed attempt to scan open containersStorage.Blob_OpenContainersScanning.FailedAttemptFailed attempt to scan publicly accessible containers for security risks4.10

4.3 Manufacturing Industry

Alert TypeTagDescriptionShare (%)
Access from a suspicious applicationStorage.Blob_ApplicationAnomalyBlob accessed using a suspicious/uncommon application28.70
Access from an unusual locationStorage.Blob_GeoAnomalyBlob accessed from a geographic location that deviates from typical patterns24.10
Access from a suspicious application (Files)Storage.Files_ApplicationAnomalyAzure Files share accessed using a suspicious application9.40
Failed attempt to scan open containersStorage.Blob_OpenContainersScanning.FailedAttemptFailed attempt to scan publicly accessible containers for security risks8.90
Malware found in blobStorage.Blob_AM.MalwareFoundMalware detected within a blob during scanning8.50
Access from an unusual location (Files)Storage.Files_GeoAnomalyAzure Files share accessed from an unexpected geographic region7.00
Anonymous access anomaly detectedStorage.Blob_AnonymousAccessAnomalyBlob accessed anonymously in an abnormal way5.20
Access from IP with suspicious file hashStorage.Blob_MalwareHashReputationBlob accessed from an IP with known malicious file hashes3.30
Malware download detectedStorage.Blob_MalwareDownloadBlob download activity suggests malware distribution2.70
Data exfiltration: unusual number of blobsStorage.Blob_DataExfiltration.NumberOfBlobsAnomalyUnusual number of blobs accessed, possible exfiltration2.30

4.4 Software Industry

Alert TypeTagDescriptionShare (%)
Access from a suspicious applicationStorage.Blob_ApplicationAnomalyBlob accessed using a suspicious/uncommon application22.20
Access from an unusual locationStorage.Blob_GeoAnomalyBlob accessed from a geographic location that deviates from typical patterns16.40
Access from IP with suspicious file hashStorage.Blob_MalwareHashReputationBlob accessed from an IP with known malicious file hashes15.60
Access from a suspicious application (Files)Storage.Files_ApplicationAnomalyAzure Files share accessed using a suspicious application8.10
Malware found in blobStorage.Blob_AM.MalwareFoundMalware detected within a blob during scanning7.80
Failed attempt to scan open containersStorage.Blob_OpenContainersScanning.FailedAttemptFailed attempt to scan publicly accessible containers for security risks7.10
Malware download detectedStorage.Blob_MalwareDownloadBlob download activity suggests malware distribution5.90
Anonymous access anomaly detectedStorage.Blob_AnonymousAccessAnomalyBlob accessed anonymously in an abnormal way5.50
Access from an unusual location (Files)Storage.Files_GeoAnomalyAzure Files share accessed from an unexpected geographic region5.50
Data exfiltration: unusual amount of dataStorage.Blob_DataExfiltration.AmountOfDataAnomalyLarge volume of data accessed/downloaded, possible exfiltration3.30
Data exfiltration: unusual number of blobsStorage.Blob_DataExfiltration.NumberOfBlobsAnomalyUnusual number of blobs accessed, possible exfiltration2.50

4.5 Energy Industry

Alert TypeTagDescriptionShare (%)
Access from a suspicious applicationStorage.Blob_ApplicationAnomalyBlob accessed using a suspicious/uncommon application38.60
Access from an unusual locationStorage.Blob_GeoAnomalyBlob accessed from a geographic location that deviates from typical patterns22.60
Successful discovery of open containersStorage.Blob_OpenContainersScanning.SuccessfulDiscoveryPublicly accessible containers discovered during scanning, exposure risk13.50
Access from a suspicious application (Files)Storage.Files_ApplicationAnomalyAzure Files share accessed using a suspicious application10.20
Access from an unusual location (Files)Storage.Files_GeoAnomalyAzure Files share accessed from an unexpected geographic region5.90
Failed attempt to scan open containersStorage.Blob_OpenContainersScanning.FailedAttemptFailed attempt to scan publicly accessible containers for security risks3.0

 

Updated Dec 01, 2025
Version 1.0
No CommentsBe the first to comment