Microsoft has unveiled that its corporate systems fell victim to a nation-state attack orchestrated by the same Russian state-sponsored hackers responsible for the sophisticated SolarWinds attack. The hackers, identified as Nobelium, successfully breached email accounts belonging to some members of Microsoft’s senior leadership team in late 2023, employing a password spray attack on a legacy non-production test tenant account.
According to a blog post from the Microsoft Security Response Center, the attackers leveraged the compromised account’s permissions to access a limited number of corporate email accounts, including those of senior leadership, cybersecurity, legal, and other functions. During the breach, the threat actors exfiltrated some emails and attached documents. Microsoft discovered the attack on January 12th, 2024, raising concerns about the duration of the unauthorized access, which remains undisclosed.
The motive behind the attack appears to be an initial focus on gathering information from email accounts. However, the extent of the stolen data remains unclear. Microsoft emphasizes that the attack did not exploit any vulnerabilities in its products or services. There is no evidence suggesting that the threat actors accessed customer environments, production systems, source code, or AI systems.
This incident occurred shortly after Microsoft’s announcement of a comprehensive software security overhaul, indicating a relentless series of cybersecurity challenges for the tech giant. While customers appear unaffected in this particular instance, it adds to Microsoft’s recent cybersecurity woes. The company faced the SolarWinds attack three years ago, a significant compromise of 30,000 organizations’ email servers in 2021 due to a Microsoft Exchange Server flaw, and a breach of US government emails by Chinese hackers via a Microsoft cloud exploit in the previous year.
In response to these challenges, Microsoft is revamping its approach to designing, building, testing, and operating its software and services. This shift marks the most significant change to its security strategy since the introduction of the Security Development Lifecycle (SDL) in 2004, prompted by vulnerabilities in Windows XP. The company remains committed to fortifying its security measures to prevent future cyber threats.
HAHAHAHAH, interesting
This is mad