• Home
  • About Us
  • Privacy Policy
  • Contact Us
  • Disclaimer
  • Terms & Conditions
Journal Official
Advertisement
  • Home
  • Tech
    • All
    • Apps
    • Gadgets
    Google’s CFO just got promoted

    Google’s CFO just got promoted

    How Google’s latest AI model is generating music from your brain activity

    How Google’s latest AI model is generating music from your brain activity

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Some top AMD chips have a huge security flaw

    Some top AMD chips have a huge security flaw

    What is a Linux Bash Script and How Do You Build One?

    What is a Linux Bash Script and How Do You Build One?

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
  • Entertainment
  • Sports
  • CryptoCurrency
  • Business
  • Health and Lifestyle
    • All
    • Food
    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems?  experts tell

    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems? experts tell

    What is ‘duck walk’ in old age?  Expert shares tips on maintaining normal mobility

    What is ‘duck walk’ in old age? Expert shares tips on maintaining normal mobility

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink.  Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink. Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    Infertility Treatment: How Ayurveda Can Help Increase Fertility?  experts tell

    Infertility Treatment: How Ayurveda Can Help Increase Fertility? experts tell

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Trending Tags

    • Golden Globes
    • Game of Thrones
    • MotoGP 2017
    • eSports
    • Fashion Week
No Result
View All Result
  • Home
  • Tech
    • All
    • Apps
    • Gadgets
    Google’s CFO just got promoted

    Google’s CFO just got promoted

    How Google’s latest AI model is generating music from your brain activity

    How Google’s latest AI model is generating music from your brain activity

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Easy Rider to Midnight Run, The Greatest Roadtrips Movies of All Time

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Three new Starfield animated shorts offer more glimpses of Bethesda’s new universe

    Some top AMD chips have a huge security flaw

    Some top AMD chips have a huge security flaw

    What is a Linux Bash Script and How Do You Build One?

    What is a Linux Bash Script and How Do You Build One?

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
  • Entertainment
  • Sports
  • CryptoCurrency
  • Business
  • Health and Lifestyle
    • All
    • Food
    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems?  experts tell

    World IVF Day: Infertility is a silent epidemic – why is it important to tackle fertility problems? experts tell

    What is ‘duck walk’ in old age?  Expert shares tips on maintaining normal mobility

    What is ‘duck walk’ in old age? Expert shares tips on maintaining normal mobility

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink.  Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    Radiohead brands portfolio expands with the launch of Hustle™ energy drink. Unveiled through new campaign “Dreams are free, #HustleModeOn for everything else – Food Marketing Technology”

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    From Chris Gayle to Virat Kohli: Most runs scored by players in India vs West Indies ODI series

    Infertility Treatment: How Ayurveda Can Help Increase Fertility?  experts tell

    Infertility Treatment: How Ayurveda Can Help Increase Fertility? experts tell

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Ishant Sharma opens up about the truth behind Zaheer Khan’s Test retirement and the allegations against Virat Kohli

    Trending Tags

    • Golden Globes
    • Game of Thrones
    • MotoGP 2017
    • eSports
    • Fashion Week
No Result
View All Result
Journal Official
No Result
View All Result
Home Tech

Microsoft still not sure how Chinese hackers got access to its systems

admin by admin
July 17, 2023
in Tech
0
Microsoft still not sure how Chinese hackers got access to its systems
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter


Microsoft is still trying to figure out how Chinese hackers managed to steal the Microsoft Account User Signature Key (MSA) and use it to target more than two dozen email accounts of various businesses and government organizations in the West. Did.

In a deeper analysis of the incident, the company confirmed that the theft is still under investigation: “The manner in which the actor obtained the keys is the subject of an ongoing investigation,” the article said. “Although the key was only for MSA accounts, a validation issue allowed this key to be trusted for signing Azure AD tokens. This issue has been corrected.”

Further in the report, the company says that its investigation, which began about a month ago, found that post-compromise activity was “limited to email access and intrusions for targeted users.”

Microsoft has fixed the issue saying that no activity is required on the part of the user. Nevertheless, the emails were breached and potentially sensitive data was taken. The group behind the attack is being tracked as Storm-0558, which Microsoft says is a Chinese cyber-espionage group focused on data theft.

Analysis: Why does it matter?

The attack was likely carried out by a Chinese state-sponsored threat actor, which means the Chinese government is behind it. Furthermore, in the attack, some of the victims are US government agencies, such as the State Department and the Department of Commerce. If the Chinese get access to sensitive information from these email accounts (which they probably do have), it could have major implications for national security. Plus, obtaining private, sensitive data allows threat actors to launch even more destructive attacks, including identity theft, wire fraud, ransomware, and more.

In recent days, relations between the United States and China have deteriorated significantly. While tensions over the development of 5G infrastructure escalated and the Trump administration banned Huawei from developing key parts of the network, things began to heat up even more around Taiwan. While China, as it claims, is preparing an all-out invasion to reunite Taiwan with mainland China and bring it back under its sovereignty, US President Joe Biden said the state would use arms if needed. Will also protect the island nation.

Stealing sensitive data from the US government could give China an edge in dealing with its Western rival on the global stage.

What have others said about it?

Microsoft reported that it noticed the campaign, which had been active for about a month at the time, after a customer reported it. It was later revealed that the client was, in fact, the US State Department.

The company confirmed that the attack was carried out using Forgotten Authentication Tokens, which allowed threat actors to access email using acquired Microsoft Account consumer signing keys. This is the key Microsoft still doesn’t know how it was stolen.

“The Microsoft investigation revealed that Storm-0558 gained access to customer email accounts by creating authentication tokens to access user email using Outlook Web Access in Exchange Online (OWA) and Outlook.com,” Microsoft reported.

“The actor used the acquired MSA key to generate tokens to access OWA and Outlook.com. MSA (consumer) keys and Azure AD (enterprise) keys are issued and managed from separate systems and should only be valid for their respective systems. The actor exploited a token verification issue to impersonate Azure AD users and gain access to enterprise mail. We have no indication that Azure AD keys or any other MSA keys were used by this actor. OWA and Outlook.com are the only services where we have seen actors using forged tokens with acquired MSA keys.

Potentially affected customers don’t have to do anything to stay protected, Microsoft said, because the update was done by the company. The Redmond software giant said it contacted the targeted firms directly, and provided them with critical information needed for mitigation and response. Microsoft concluded, “If you have not been contacted, our investigation indicates that you have not been affected.”

In his report on the news, bleepingcomputer Added that after all active MSA signing keys were revoked, and the API flaw was mitigated, the attackers switched to newer techniques. “In addition, we have seen Storm-0558 divert to other technologies, which indicates that the actor has not been able to use or access any signing keys,” Microsoft said.

sc magazineOn the other hand, reminds its readers that this was no ordinary cyberattack, but an “advanced and strategically executed” attack.

“Nation-state attackers have the resources and skills to break into accounts, and once inside they can also remain unknown. In this attack, the Storm-0558 attackers were hiding within government email accounts, with access to data in those accounts, up to a month before the targeted agencies noticed unusual mail activity,” it reminds.

The publication also states that IT teams generally face an uphill battle against cybercriminals, as cybercriminals often misuse previously unknown vulnerabilities to break into systems and infiltrate endpoints. . However, that doesn’t mean they can’t fight them. It simply means they need a “layered security approach,” which includes MFA, app security programs, behavior-based anomaly detection, and more.

go deeper

If you want to know more about this attack, be sure to read our initial report. Plus, you should read our in-depth guide to what phishing is, what are the best firewalls for SMB, and our guide on the best malware removal tools right now.

Previous Post

Former Samajwadi Party MLA and OBC leader Dara Singh Chauhan joins BJP, calls it ‘ghar wapsi’

Next Post

Polkadot price gains momentum as open interest climbs – details

admin

admin

Next Post
Polkadot price gains momentum as open interest climbs – details

Polkadot price gains momentum as open interest climbs – details

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Journal Official

Welcome to our News Magazine Website, your go-to source for the latest and most compelling news around the Globe. Stay informed, stay inspired, and explore the world through our comprehensive and user-friendly platform.

Follow Us

Recent posts

  • Open Access vs. Subscription: Masa Depan Aksesibilitas Jurnal Akademik
  • Strategi Memilih Jurnal yang Tepat untuk Naskah Penelitian Anda
  • Peran Jurnal Terindeks Scopus: Mengapa Penting untuk Karier Akademik
  • Etika Penulisan Ilmiah: Menghindari Plagiarisme dan Pelanggaran Kode Etik
  • Memahami Proses Peer Review: Kunci Kualitas Publikasi Ilmiah

Recent News

Open Access vs. Subscription: Masa Depan Aksesibilitas Jurnal Akademik

December 7, 2025

Strategi Memilih Jurnal yang Tepat untuk Naskah Penelitian Anda

December 7, 2025
  • Home
  • About Us
  • Privacy Policy
  • Contact Us
  • Disclaimer
  • Terms & Conditions

© 2023 Journal Official - News Magazine

No Result
View All Result
  • Disclaimer

© 2023 Journal Official - News Magazine