Article Details
Scrape Timestamp (UTC): 2024-01-20 03:14:49.013
Source: https://thehackernews.com/2024/01/microsofts-top-execs-emails-breached-in.html
Original Article Text
Click to Toggle View
Microsoft's Top Execs' Emails Breached in Sophisticated Russia-Linked APT Attack. Microsoft on Friday revealed that it was the target of a nation-state attack on its corporate systems that resulted in the theft of emails and attachments from senior executives and other individuals in the company's cybersecurity and legal departments. The Windows maker attributed the attack to a Russian advanced persistent threat (APT) group it tracks as Midnight Blizzard (formerly Nobelium), which is also known as APT29, BlueBravo, Cloaked Ursa, Cozy Bear, and The Dukes. It further said that it immediately took steps to investigate, disrupt, and mitigate the malicious activity upon discovery on January 12, 2024. The campaign is estimated to have commenced in late November 2023. "The threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account's permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents," Microsoft said. Redmond said the nature of the targeting indicates the threat actors were looking to access information related to themselves. It also emphasized that the attack was not the result of any security vulnerability in its products and that there is no evidence that the adversary accessed customer environments, production systems, source code, or AI systems. The computing giant, however, did not disclose how many email accounts were infiltrated, and what information was accessed, but said it was the process of notifying employees who were impacted as a result of the incident. The hacking outfit, which was previously responsible for the high-profile SolarWinds supply chain compromise, has singled out Microsoft twice, once in December 2020 to siphon source code related to Azure, Intune, and Exchange components, and a second time breaching three of its customers in June 2021 via password spraying and brute-force attacks. "This attack does highlight the continued risk posed to all organizations from well-resourced nation-state threat actors like Midnight Blizzard," the Microsoft Security Response Center (MSRC) said. SaaS Security Masterclass: Insights from 493 Companies Watch this webinar to discover Critical SaaS Security Do's and Don'ts based on a study of 493 companies, offering real-world comparisons and benchmarks.
Daily Brief Summary
Microsoft identified a sophisticated nation-state attack attributed to the Russian APT group known as Midnight Blizzard, which compromised emails from top executives.
The attack commenced in late November 2023 and was detected on January 12, 2024, after which immediate investigation and mitigation steps were taken.
Attackers executed a password spray attack on a legacy non-production test tenant account to access corporate emails, affecting senior leadership and departments like cybersecurity and legal.
No evidence suggests that customer data, production systems, source code, or AI systems were compromised.
The total number of infiltrated accounts and the extent of accessed information remain undisclosed, with impacted employees currently being notified.
The same hacking group was previously responsible for the SolarWinds supply chain attack and has targeted Microsoft on several occasions.
Microsoft highlighted the persistent risks posed by well-resourced nation-state actors, emphasizing the need for robust security measures across organizations.