Chinese hackers breach US government emails using a Microsoft cloud bug
#1
Exclamation 
Quote:According to Microsoft, hackers from China have accessed the email accounts of about 25 organizations, including government organizations.

The attacks have been linked to a threat group known as Storm-0558, which is thought to be a cyber-espionage gang that specializes in hacking email networks to obtain sensitive information. The software behemoth has not specified the locations of the government organizations.

On June 16, 2023, Microsoft began looking into these attacks as a result of consumer complaints about odd Office 365 mail behavior. The business found that beginning on May 15, 2023, Storm-0558 threat actors gained access to customer accounts that were probably related to approximately 25 entities, including the U.S. State and Commerce Departments.

Microsoft did not, however, specify which businesses, institutions of government, or nations were impacted by these email security incidents. The U.S. government was referred to as "the world's biggest hacking empire and a global cyber thief" by the Chinese embassy in London, which also labeled the claim as "disinformation." Regardless of the facts or context, China constantly denies involvement in hacking operations.

A breach in Microsoft's cloud security "affected unclassified systems," according to Adam Hodge, a spokesman for the White House National Security Council, without providing any further details.

"Officials immediately contacted Microsoft to find the source and vulnerability in their cloud service," Hodge continued.

[Image: microsoft-headquarters-exterior.jpg]

Hackers stole 25 emails

About 25 email accounts, including those of governmental agencies and linked consumer accounts belonging to people affiliated to these institutions, were hijacked by the cyber group Storm-0558, according to Microsoft. Microsoft uses the term "Storm" to identify and monitor hacker networks that are brand-new, growing, or "in development." Microsoft has not revealed the names of the government agencies targeted by Storm-0558.

According to Microsoft's study, the hacking group Storm-0558, which the company describes as a "well-resourced" adversary, used Outlook Web Access in Exchange Online (OWA) and Outlook.com to access user accounts by forging authentication tokens. According to Microsoft's technical examination of the assault, the hackers forged tokens to access OWA and Outlook.com using a Microsoft consumer signing key they had obtained. After that, the hackers used a token validation flaw to pretend to be Azure AD users and access corporate email accounts.

Storm-0885's harmful behavior went undiscovered for approximately a month before users warned the company about unusual mail activity, says Microsoft.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Android Security Bulletin—May 2026
Android Security...harlan4096 — 08:10
AdwCleaner 8.8.0
AdwCleaner 8.8.0 ...harlan4096 — 08:07
AdGuard VPN for Windows 2.9.2
AdGuard VPN for Wi...harlan4096 — 08:06
Google Chrome Is Silently Downloading a ...
Google Chrome has ...harlan4096 — 08:04
QOwnNotes
26.5.2 Pressing Ctr...Kool — 06:39

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (28)akiratoriyama
avatar (48)Jerrycix
avatar (40)awedoli
avatar (82)WinRARHowTo
avatar (38)owysykan
avatar (49)beautgok
avatar (39)axuben
avatar (45)talsmanthago
avatar (31)mocetor
avatar (46)piomaibhaict
avatar (51)kingbfef
avatar (38)izenesiq
avatar (40)ihijudu
avatar (45)tiojusop
avatar (42)Damiennug
avatar (40)acoraxe
avatar (49)contjrat
avatar (41)axylisyb
avatar (44)tukrublape
avatar (41)iruqi
avatar (42)saitetib
avatar (36)ypasodiny
avatar (39)omapek
avatar (48)Geraldtuh
avatar (44)knigiJow
avatar (46)1stOnecal
avatar (50)Mirzojap
avatar (36)idilysaju
avatar (40)GregoryRog
avatar (45)mediumog
avatar (40)odukoromu
avatar (46)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>