TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Microsoft actions following attack by nation state actor Midnight Blizzard

280 pointsby nycdatasciover 1 year ago

31 comments

yborgover 1 year ago
&quot;We were pwned by the Russians (again) and they were reading all of Satya&#x27;s emails, but it&#x27;s okay, they were just looking for shout-outs to post in their interoffice Telegram channel for the lulz.&quot;<p>I understand that the company has to minimize every breach but this frankly looks a lot more serious than Microsoft suggests here.
评论 #39065583 未加载
评论 #39064250 未加载
评论 #39064919 未加载
评论 #39066133 未加载
评论 #39065403 未加载
评论 #39065526 未加载
评论 #39088790 未加载
hbcondo714over 1 year ago
Microsoft filed this late today with the SEC[1] just before they stopped accepting new filings for the day under their new Cybersecurity Incident disclosure rule[2]. FWIW, two other publicly traded companies disclosed[3] their breaches since the rule went into affect last month.<p>[1] <a href="https:&#x2F;&#x2F;www.sec.gov&#x2F;Archives&#x2F;edgar&#x2F;data&#x2F;789019&#x2F;000119312524011295&#x2F;d708866d8k.htm" rel="nofollow">https:&#x2F;&#x2F;www.sec.gov&#x2F;Archives&#x2F;edgar&#x2F;data&#x2F;789019&#x2F;0001193125240...</a><p>[2] <a href="https:&#x2F;&#x2F;www.sec.gov&#x2F;news&#x2F;press-release&#x2F;2023-139" rel="nofollow">https:&#x2F;&#x2F;www.sec.gov&#x2F;news&#x2F;press-release&#x2F;2023-139</a><p>[3] <a href="https:&#x2F;&#x2F;last10k.com&#x2F;stock-screeners&#x2F;cybersecurity" rel="nofollow">https:&#x2F;&#x2F;last10k.com&#x2F;stock-screeners&#x2F;cybersecurity</a>
评论 #39067069 未加载
paxysover 1 year ago
&gt; Beginning in late November 2023, the threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts [...]<p>&gt; The attack was not the result of a vulnerability in Microsoft products or services.<p>Hmm...
评论 #39071011 未加载
评论 #39070643 未加载
评论 #39063835 未加载
voidwtfover 1 year ago
How did they pivot from a test tenant to corporate email access?<p>That&#x27;s the most concerning fact that they just glossed over.
评论 #39064311 未加载
评论 #39065077 未加载
评论 #39064342 未加载
评论 #39069419 未加载
BandButcherover 1 year ago
Haha &quot;...access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents.&quot;<p>Seems like a big deal. Also, this may be why I&#x27;ve been getting massive amounts of &quot;unusual account sign-in activity&quot; emails for Microsoft about an old outlook account i no longer use...<p>Hopefully these state actors can get access to my vsts server i no longer can find and deploy an old app for me ;)
akira2501over 1 year ago
Interesting that they seem to suggest that applying security is now more important than avoiding service disruptions. This may be the hopeful dawn of a new era.
评论 #39063950 未加载
评论 #39065655 未加载
评论 #39062554 未加载
评论 #39065666 未加载
clwgover 1 year ago
They should look at upgrading their Entra ID plan to P2 in order to protect against these attacks.
评论 #39063404 未加载
评论 #39064756 未加载
IronWolveover 1 year ago
Did they release this late on a friday to downplay the scope of the attack?<p>If they had top leadership accounts and service accounts hacked just by password protection sounds like a major security fubar.
评论 #39063162 未加载
starik36over 1 year ago
&gt; access a very small percentage of Microsoft corporate email accounts<p>Ok, so far so good.<p>&gt; including members of our senior leadership team<p>Ahhh, so maybe the attackers were after the senior leadership team and therefore stopped at the &quot;very small percentage&quot;.
评论 #39062393 未加载
cedwsover 1 year ago
&gt;Beginning in late November 2023, the threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts<p>I have so many questions from this sentence alone. What did they password spray? Microsoft&#x27;s internal identity provider? Was the non-prod system internet facing? Why isn&#x27;t MFA enforced?
评论 #39065438 未加载
评论 #39065208 未加载
评论 #39065597 未加载
voytecover 1 year ago
I wonder which mail client the execs were using. If Outlook, their messages would be already harvested by 700+ companies[0] and another leak wouldn&#x27;t be an issue.<p>[0] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38441710">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38441710</a><p>[0] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38953618">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38953618</a>
评论 #39064641 未加载
modelessover 1 year ago
Um. Why does &quot;a legacy non-production test tenant account&quot; have &quot;permissions&quot; for &quot;email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions&quot;?
评论 #39064914 未加载
slackrover 1 year ago
Why do they say &quot;nation state actor&quot;, isn&#x27;t &quot;state actor&quot; the correct term? I thought Russia, like the UK and many other states, is a multinational state, including numerous languages and cultures.
评论 #39066113 未加载
评论 #39067126 未加载
评论 #39066500 未加载
评论 #39066814 未加载
amaiover 1 year ago
„compromise a legacy non-production test tenant account and gain a foothold, and then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents.“<p>Does a non-production test account usually have permission to access email accounts of the senior leadership team? Is that a security best practice?
jongjongover 1 year ago
I&#x27;m wondering how many hacks like this must occur before companies start caring about hiring good developers with a proven individual record instead of those who can solve the most gimmicky puzzles in 30 minutes.<p>There are developers out there with excellent track records who have built bug-free solo projects which prove their excellence and yet can&#x27;t find a job in this economy. Some of these developers have also proven themselves to work well in a team so there is no excuse to ignore them. They are excellent both as lone wolf and team player. Companies should desperately look for them and recruit them. Only such developers can save companies from technical decay.
kgeistover 1 year ago
&gt;Microsoft has identified the threat actor as Midnight Blizzard, the Russian state-sponsored actor also known as Nobelium<p>How do they identify those groups?
评论 #39065984 未加载
评论 #39066019 未加载
评论 #39067173 未加载
sneakover 1 year ago
Why does the data security industry seem to be so into obfuscated jargon? It’s like a new industry microcosm corporatespeak.<p>It’s ok to call them countries, hackers, and intrusions.<p>Microsoft got hacked by Russian government hackers.
评论 #39062227 未加载
评论 #39062152 未加载
评论 #39062177 未加载
评论 #39062325 未加载
评论 #39062532 未加载
评论 #39062136 未加载
评论 #39062352 未加载
评论 #39063086 未加载
yukIttEftover 1 year ago
From the same company that charges you to access your logfiles.<p><a href="https:&#x2F;&#x2F;www.theregister.com&#x2F;2023&#x2F;07&#x2F;20&#x2F;under_cisa_spressures_collaboration_microsoft&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.theregister.com&#x2F;2023&#x2F;07&#x2F;20&#x2F;under_cisa_spressures...</a>
评论 #39066559 未加载
Roark66over 1 year ago
Seriously? This reads like a joke. They brute forced some tenant test systems.<p>Fine, I bet the password was Password123!, but then &quot;they used account&#x27;s permissions&quot; to access various corporate emails. How is that even possible? What does it mean &quot;they used the account&#x27;s permissions&quot;? Are you telling me there was no privilege separation between a tenant test environment and the internal domain? That the tenant system was not in its own isolated network? This is absolutely insane. Whenever I read stuff like that I wonder if some junior IT employee didn&#x27;t just buy a new home for cash few months ago. I&#x27;m all for &quot;don&#x27;t look for malice where incompetence is a sufficient explanation&quot;, but that&#x27;s just a little too much incompetence to be believable.
1vuio0pswjnm7over 1 year ago
&quot;Microsoft took advantage of news of this hack to talk about how they are going to move forward to make itself more secure.&quot;<p><a href="https:&#x2F;&#x2F;techcrunch.com&#x2F;2024&#x2F;01&#x2F;19&#x2F;hackers-breached-microsoft-to-find-out-what-microsoft-knows-about-them&#x2F;" rel="nofollow">https:&#x2F;&#x2F;techcrunch.com&#x2F;2024&#x2F;01&#x2F;19&#x2F;hackers-breached-microsoft...</a>
louskenover 1 year ago
I am surprised they had logs for this long. Entra only comes with 30 days of audit logs by default which is utterly insane
评论 #39098881 未加载
mrkramerover 1 year ago
&gt;Beginning in late November 2023, the threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold<p>If people at Microsoft reuse passwords than what we can expect from casual PC users?!
carabinerover 1 year ago
What does the title mean?
评论 #39062446 未加载
评论 #39064877 未加载
评论 #39062270 未加载
m3kw9over 1 year ago
MS is a joke at security and they prob have 2000 person in a building doing this stuff too
m3kw9over 1 year ago
Swiss cheese security as usual
wly_cdgrover 1 year ago
Now I understand why Microsoft bought Activision Blizzard. So they could fight Midnight Blizzard.
yeahthatoneover 1 year ago
i found $ signs $ in my AI prompt text-box suggesting shell interference while also experiencing buffer overflow in my local windows pc. just a random Dalle3 user in Bing&#x27;s image creator
mistrial9over 1 year ago
this reminds me of guys trying to out-shout each other about who wants to fight the most, in front of a lot of (Ynews) onlookers
JeffSnazzover 1 year ago
Oh god they&#x27;re russian. That means they&#x27;re <i>evil</i>!
评论 #39065705 未加载
postepowanieadmover 1 year ago
Just block all traffic from russia :)
评论 #39065946 未加载
yieldcrvover 1 year ago
“it was Russia, they went thata way!”<p>this presents no proof, but I’ve read lots of krebs security proof on other exploits and I think it is all very weak<p>nothing is stopping anybody here from putting breadcrumbs in a payload to point the finger at North Korea or a former Soviet state<p>This is kind of a silly standard that allows hackers to operate with impunity and companies to avoid accountability and the fbi from not bothering
评论 #39064163 未加载