Microsoft Targeted Again by Russian Hackers Using Stolen Data

This revelation has heightened concerns among analysts regarding the security of Microsoft's systems and services.

On Friday, Microsoft announced that it was under renewed attack by hackers linked to Russia’s foreign intelligence service, utilizing data pilfered from corporate emails in January to orchestrate fresh breaches.

These hackers, affiliated with the Russian state-sponsored group known as Midnight Blizzard or Nobelium, aim to infiltrate Microsoft’s networks, posing a significant threat to the U.S. national security establishment which relies heavily on Microsoft’s software solutions.

This revelation has heightened concerns among analysts regarding the security of Microsoft’s systems and services.

Given its stature as one of the largest software companies globally and a key provider for the U.S. government, the potential national security implications have alarmed experts.

The Russian embassy in Washington has yet to respond to inquiries regarding these allegations.

Microsoft first acknowledged the breach in January, detailing attempts by the hackers to access corporate email accounts, including those of top executives and departments such as cybersecurity, legal, and others.

The company recently observed that Midnight Blizzard is exploiting the previously stolen information to gain or try to gain unauthorized access, as mentioned in a new blog post.

Jerome Segura, principal threat researcher at Malwarebytes’ Threatdown Labs, expressed concern over the ongoing nature of the attack despite Microsoft’s efforts to secure its systems.

The breach’s scope includes stolen access to source code repositories and internal systems, underscoring the severity of the threat.

The manner of these intrusions, including the use of “password spray” attacks, demonstrates Midnight Blizzard’s persistence and sophistication.

These attacks have reportedly intensified significantly since their initial detection in January.

The hacking group’s focus on Microsoft, attributed to the company’s extensive research into their operations, underscores the strategic importance of the target.

Adam Meyers, a senior vice president at Crowdstrike, highlighted the grave implications of the hackers’ deep infiltration and Microsoft’s struggle to expel them after two months.

Midnight Blizzard’s consistent efforts indicate a well-resourced, coordinated campaign aimed at exploiting various types of “secrets,” including confidential communications between Microsoft and its customers.

While Microsoft has refrained from naming specific victims, it is actively working to assist affected customers in mitigating the damages.