Microsoft revealed on Friday that it fell victim to a nation-state attack on its corporate systems, resulting in the theft of emails and attachments from senior executives and individuals in the company's cybersecurity and legal departments.
The attack has been attributed to a Russian advanced persistent threat (APT) group known as Midnight Blizzard (formerly Nobelium), also recognized as APT29, BlueBravo, Cloaked Ursa, Cozy Bear, and The Dukes.
Microsoft detected the malicious activity on January 12, 2024, and promptly took steps to investigate, disrupt, and mitigate the situation. The campaign is believed to have started in late November 2023.
According to Microsoft, the threat actor used a password spray attack to compromise a legacy non-production test tenant account, gaining a foothold. Subsequently, they utilized the account's permissions to access a small percentage of Microsoft corporate email accounts, including members of the senior leadership team and employees in cybersecurity, legal, and other functions. Some emails and attached documents were exfiltrated in the process.
Microsoft clarified that the targeting nature indicates the threat actors sought information related to themselves. The company emphasized that the attack did not result from security vulnerabilities in its products, and there is no evidence that the adversary accessed customer environments, production systems, source code, or AI systems.
Although Microsoft did not disclose the number of infiltrated email accounts or the accessed information, it assured that it was in the process of notifying affected employees.
The hacking group, previously responsible for the SolarWinds supply chain compromise, targeted Microsoft twice before, once in December 2020 to access source code related to Azure, Intune, and Exchange components, and a second time in June 2021 breaching three customers through password spraying and brute-force attacks.
The Microsoft Security Response Center (MSRC) emphasized that this attack underscores the ongoing risk faced by all organizations from well-resourced nation-state threat actors like Midnight Blizzard.
microsoft hacked microsoft breach microsoft cybersecurity microsoft russia which of the following is an attack vector used by threat actors to penetrate a system? microsoft security breach russian hackers microsoft

Love the sleek design and easy navigation – this website is a visual treat!
ReplyDeleteThis website is a treasure trove of information, a true knowledge hub
ReplyDeleteThe art of saying a lot with a little – these comments are a masterclass in brevity.
ReplyDeleteSuch a valuable resource – thank you!
ReplyDeleteThis website has a lot of useful resources. It's become my go-to for information
ReplyDeleteI'm grateful for your insights.
ReplyDelete"The educational content here is presented in an engaging manner."
ReplyDeleteThe simplicity of the layout enhances readability.
ReplyDeleteThis is exactly what I needed to read today. Your words are so motivating
ReplyDelete