Close

Microsoft Takes Action to Limit Hacker Access to Government Email Accounts

An in-depth look into a recent cybersecurity incident reveals that hackers gained unauthorized access to the email accounts of 25 organizations, including government agencies. Microsoft has announced that it successfully thwarted a group of hackers known as Storm-0558, who managed to breach the email accounts of these organizations.

The Method of Access Employed by the Hackers Microsoft detected abnormal activity in several email accounts on June 16, following reports from its customers. Upon investigation, it was discovered that the hacking group exploited a vulnerability that allowed them to create authentication tokens, granting them entry into Microsoft 365 accounts belonging to various organizations. By utilizing a compromised signing key from a Microsoft consumer account, the hackers were able to impersonate users and gain access to email accounts via services such as Outlook Web Access and Outlook.com.

Concerns Raised by the Cybersecurity Community Both the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued a joint advisory, stating that they had identified suspicious activity in their Microsoft 365 logs. Further investigation revealed that advanced persistent threat actors had accessed and extracted data from certain Exchange Online Outlook accounts.

Unmasking Storm-0558 Microsoft has provided a profile of Storm-0558, classifying it as a nation-state activity group operating out of China. Their primary objectives include espionage, data theft, and obtaining credentials. The group is also known to utilize custom malware referred to by Microsoft as Cigril and Bling, specifically designed for credential access.

Addressing the Issue at Hand CISA and the FBI have advised organizations using Exchange Online to implement enhanced monitoring and logging systems to detect similar attacks. Their recommendations include enabling advanced audit logging features and gaining insight into typical cloud traffic patterns.

Microsoft claims to have fully resolved the issue and successfully blocked the hackers’ access. The company is working closely with affected customers and has provided them with prior notification in preparation for public disclosure. There is currently no evidence to suggest that the hackers still maintain a presence within any corporate systems.

Preventing Future Cyberattacks This incident serves as a reminder of the escalating frequency of cyberattacks against organizations worldwide. Senator Mark R. Warner, Chairman of the Senate Select Committee on Intelligence, expressed concern over this recent breach and emphasized the importance of taking preventive measures to avoid future incidents. He highlighted the need for close collaboration between the U.S. government and the private sector in countering the evolving threat posed by Chinese intelligence.

Microsoft remains committed to enhancing security measures concerning account keys and tokens to stay one step ahead of evolving cyber risks. The company emphasizes the significance of continued collaboration and transparency within the tech industry to fortify defenses against sophisticated hacking campaigns.