Eblogtip.com
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions

Archives

  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • December 2022

Categories

  • News
  • Technology
  • Uncategorized
eBlogTip
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions
  • News

Microsoft thinks it knows how Chinese hackers were able to breach US government accounts

  • September 7, 2023
Total
0
Shares
0
0
0


Microsoft’s investigation into the recent Storm-0558 cyberattack has concluded by claiming the company now knows how the Chinese threat actor accessed US government email accounts.

Two months ago, a Chinese hacking group known as Storm-0558 accessed more than two dozen Microsoft email accounts belonging to various organizations in the West, including several US government agencies. 

Initial investigation showed that the hackers used a previously obtained Microsoft account (MSA) consumer key to forge tokens to access OWA and Outlook.com.

Correcting issues

What remained a mystery was how the hackers obtained that consumer key in the first place. Two months later, the Redmond giant’s in-depth investigation concluded, showing that the signing key was included in a consumer signing system crash dump, from April 2021. 

“The crash dumps, which redact sensitive information, should not include the signing key,” Microsoft explained. “In this case, a race condition allowed the key to be present in the crash dump (this issue has been corrected). The key material’s presence in the crash dump was not detected by our systems (this issue has been corrected).”

The crash dump was then moved into the company’s debugging environment on the internet-connected corporate network. While this is consistent with the company’s standard debugging process, it made it possible for hackers to steal. In the months following the crash dump’s creation, a member of Storm-0558 obtained a Microsoft corporate account belonging to an engineer, and given that the account had access to the debugging environment, they managed to grab the crash dump from one of the endpoints.

“Due to log retention policies, we don’t have logs with specific evidence of this exfiltration by this actor, but this was the most probable mechanism by which the actor acquired the key,” Microsoft concluded.

At the time of the breach, Microsoft revoked all valid MSA signing keys, effectively shutting the hackers out.

More security news from TechRadar Pro


Source link

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Previous Article
  • Technology

YouTube is testing longer but fewer ads on TV

  • September 7, 2023
View Post
Next Article
  • Technology

Derivative works are generative AI’s poison pill

  • September 7, 2023
View Post
You May Also Like
View Post
  • News

Asus sells the largest microLED monitor ever for a cool $200,000 — but it’s only 4K and a low refresh rate

  • September 21, 2023
View Post
  • News

Facebook now lets you create alt accounts for better privacy and organization

  • September 21, 2023
View Post
  • News

The world’s most famous magician invests in data storage startup that wants to send 100GB disks to the Moon for future humanoids

  • September 21, 2023
View Post
  • News

YouTube reveals powerful new AI tools for content creators – and we’re scared, frankly

  • September 21, 2023
View Post
  • News

CEO of DuckDuckGo Testifies in Google Case

  • September 21, 2023
View Post
  • News

Windows Copilot might be the biggest change Microsoft has ever made to its long-running OS

  • September 21, 2023
View Post
  • News

Despite general investment downturn AI sees surge in spending, survey shows

  • September 21, 2023
View Post
  • News

Everything Microsoft announced at its 2023 Surface Event

  • September 21, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eBlogTip.com
  • Categories

Input your search keywords and press Enter.