{"id":211675,"date":"2024-03-09T18:06:22","date_gmt":"2024-03-09T18:06:22","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/03\/09\/microsoft-admits-russian-state-hack-still-not-contained\/"},"modified":"2025-06-25T17:20:56","modified_gmt":"2025-06-25T17:20:56","slug":"microsoft-admits-russian-state-hack-still-not-contained","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/03\/09\/microsoft-admits-russian-state-hack-still-not-contained\/","title":{"rendered":"Microsoft admits Russian state hack still not contained"},"content":{"rendered":"<p> [ad_1]<br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/content.fortune.com\/wp-content\/uploads\/2024\/03\/AP24069014153138-e1710000321324.jpg?w=2048\" \/><\/p>\n<p><a href=\"https:\/\/fortune.com\/company\/microsoft\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">Microsoft<\/a> said Friday it\u2019s still trying to evict the elite Russian government hackers who broke into the email accounts of senior company executives in November and who it said have been trying to breach customer networks with stolen access data.<\/p>\n<div>\n<p>The hackers from Russia\u2019s SVR foreign intelligence service used data obtained in the intrusion, which it\u00a0<a href=\"https:\/\/apnews.com\/article\/microsoft-russian-hackers-email-breach-sec-rule-84610492e56778767116a3f89f7ff658\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">disclosed in mid-January<\/a>, to compromise some source-code repositories and internal systems, the software giant said\u00a0<a href=\"https:\/\/msrc.microsoft.com\/blog\/2024\/03\/update-on-microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">in a blog<\/a>\u00a0and a\u00a0<a href=\"https:\/\/microsoft.gcs-web.com\/node\/32471\/html\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">regulatory filing<\/a>.<\/p>\n<p>A company spokesman would not characterize what source code was accessed and what capability the hackers gained to further compromise customer and Microsoft systems. Microsoft said Friday that the hackers stole \u201csecrets\u201d from email communications between the company and unspecified customers \u2014 cryptographic secrets such as passwords, certificates and authentication keys \u2014and that it was reaching out to them \u201cto assist in taking mitigating measures.\u201d<\/p>\n<p>Cloud-computing company Hewlett Packard Enterprise\u00a0<a href=\"https:\/\/apnews.com\/article\/russian-hackers-hewlett-packard-enterprise-microsoft-sec-breach-cozy-bear-d4e88ded0a47d010216e11f41132f72c\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">disclosed on Jan. 24<\/a>\u00a0that it, too, was an SVR hacking victim and that it had been informed of the breach \u2014 by whom it would not say \u2014 two weeks earlier, coinciding with Microsoft\u2019s <a href=\"https:\/\/fortune.com\/company\/discovery-insurance\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">discovery<\/a> it had been hacked.<\/p>\n<p>\u201cThe threat actor\u2019s ongoing attack is characterized by a sustained, significant commitment of the threat actor\u2019s resources, coordination, and focus,\u201d Microsoft said Friday, adding that it could be using obtained data \u201cto accumulate a picture of areas to attack and enhance its ability to do so.\u201d Cybersecurity experts said Microsoft\u2019s admission that the SVR hack had not been contained exposes the perils of the heavy reliance by government and business on the Redmond, Washington, company\u2019s software monoculture \u2014 and the fact that so many of its customers are linked through its global cloud network.<\/p>\n<p>\u201cThis has tremendous national security implications,\u201d said Tom Kellermann of the cybersecurity firm Contrast Security. \u201cThe Russians can now leverage supply chain attacks against Microsoft\u2019s customers.\u201d<\/p>\n<p>Amit Yoran, the CEO of Tenable, also issued a statement, expressing both alarm and dismay. He is among security professionals who find Microsoft overly secretive about its vulnerabilities and how it handles hacks.<\/p>\n<p>\u201cWe should all be furious that this keeps happening,\u201d Yoran said. \u201cThese breaches aren\u2019t isolated from each other and Microsoft\u2019s shady security practices and misleading statements purposely obfuscate the whole truth.\u201d<\/p>\n<p>Microsoft said it had not yet determined whether the incident is likely to materially impact its finances. It also said the intrusion\u2019s stubbornness \u201creflects what has become more broadly an unprecedented global threat landscape, especially in terms of sophisticated nation-state attacks.\u201d<\/p>\n<p>The hackers, known as Cozy Bear, are the same hacking team behind the\u00a0<a href=\"https:\/\/apnews.com\/article\/business-technology-government-and-politics-f51e53523312b87121146de8fd7c0020\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">SolarWinds breach<\/a>.<\/p>\n<p>When it initially announced the hack, Microsoft said the SVR unit broke into its corporate email system and accessed accounts of some senior executives as well as employees on its cybersecurity and legal teams. It would not say how many accounts were compromised.<\/p>\n<p>At the time, Microsoft said it was able to remove the hackers\u2019 access from the compromised accounts on or about Jan. 13. But by then, they clearly had a foothold.<\/p>\n<p>It said they got in by compromising credentials on a \u201clegacy\u201d test account but never elaborated.<\/p>\n<p>Microsoft\u2019s latest disclosure comes three months after\u00a0<a href=\"https:\/\/apnews.com\/article\/sec-cybersecurity-breach-disclosure-risk-hacking-bb6252463637793bfdc8ace5bfcbe7df\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">a new U.S. Securities and Exchange Commission rule<\/a>\u00a0took effect that compels publicly traded companies to disclose breaches that could negatively impact their business.<\/p>\n<\/div>\n<div data-cy=\"subscriptionPlea\">Subscribe to the Eye on AI newsletter to stay abreast of how AI is shaping the future of business. <a href=\"https:\/\/www.fortune.com\/newsletters\/eye-on-ai?&amp;itm_source=fortune&amp;itm_medium=article_tout&amp;itm_campaign=eye_on_ai\" target=\"_self\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">Sign up<\/a> for free.<\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/fortune.com\/2024\/03\/09\/microsoft-admits-russian-state-hack-still-not-contained\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Microsoft said Friday it\u2019s still trying to evict the elite Russian government hackers who broke into the email accounts of senior company executives in<\/p>\n","protected":false},"author":1,"featured_media":211676,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[149],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/211675"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=211675"}],"version-history":[{"count":2,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/211675\/revisions"}],"predecessor-version":[{"id":339160,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/211675\/revisions\/339160"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/211676"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=211675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=211675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=211675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}