johnleonard, to Russia
@johnleonard@mastodon.social avatar

CISA issues emergency order on Microsoft breach by Russian hackers

Affected bodies must take immediate action, agency says

https://www.computing.co.uk/news/4196664/cisa-issues-emergency-order-microsoft-breach-russian-hackers

#cisa #midnightblizzard #russia #nobelium #microsoft #infosec

bodomenke, (edited ) to microsoft
@bodomenke@hessen.social avatar

Five Eyes warning, that APT29 is going after MS customers

Why do I need a Wapo article to stumble over it? Were there any alerts in EU I missed (BSI?)? Any news on this already in European media outlets?

„Microsoft attributed the ongoing attacks to an SVR group that it calls Midnight Blizzard and that other security companies refer to as APT29 or Cozy Bear.“

https://infosec.exchange/@JosephMenn/112062526327167579

br00t4c, to microsoft
@br00t4c@mastodon.social avatar

Microsoft says Kremlin-backed hackers accessed its source and internal systems

https://arstechnica.com/?p=2008953

AAKL, to microsoft
@AAKL@noc.social avatar

: Suspected Russian spies accessed source code repositories after stealing corporate email data in January https://www.pcmag.com/news/microsoft-russian-hackers-accessed-company-source-code @PCMag

k3ym0, to Cybersecurity

Don't use Exchange On-Prem - It's riddled with vulnerabilities, they said.

Use Office 365 - It's way more secure, they said.

Meanwhile, MSFT leaving test OAuth accounts active, with:
✅ admin privileges
✅ weak password
✅ no MFA

(insert jokerclapping.gif)

https://arstechnica.com/security/2024/01/in-major-gaffe-hacked-microsoft-test-account-was-assigned-admin-privileges/

publicvoit, to microsoft
@publicvoit@graz.social avatar

@alex (this one: https://en.wikipedia.org/wiki/Alex_Stamos) on the latest Security Team hack allegedly by and Microsoft's public incident response including appropriate "translations" by Alex:

"Microsoft's Dangerous Addiction To Revenue" https://www.linkedin.com/pulse/microsofts-dangerous-addiction-security-revenue-alex-stamos-1ukzc

TL;DR: MS fucks up big time and is using that for selling more of their security services.

Background: https://www.wired.com/story/microsoft-hpe-midnight-blizzard-email-breaches/

br00t4c, to random
@br00t4c@mastodon.social avatar

Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight

https://www.wired.com/story/microsoft-hpe-midnight-blizzard-email-breaches/

toni, to infosec
@toni@pancake.place avatar

Re: , Hacker News comments have nice tldr as always https://news.ycombinator.com/item?id=39064593

jbzfn, to microsoft
@jbzfn@mastodon.social avatar

「 A device inside Microsoft’s network was protected by a weak password with no form of two-factor authentication employed. The Russian adversary group was able to guess it by peppering it with previously compromised or commonly used passwords until they finally landed on the right one. The threat actor then accessed the account, indicating that either 2FA wasn’t employed or the protection was somehow bypassed 」

https://arstechnica.com/?p=1997633

rysiek, to random
@rysiek@mstdn.social avatar

Midnight Blizzard Entertainment. :blobcatpopcorn:

rysiek,
@rysiek@mstdn.social avatar

> Beginning in late November 2023, the threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents.
https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/

rysiek,
@rysiek@mstdn.social avatar

> To date, there is no evidence that the threat actor had any access to customer environments, production systems, source code, or AI systems.

Oh this gon b good! :blobcatpopcornnom:

Here's a question: if a threat actor did gain access to AI systems, and maliciously modified the models in some way — apart from audit trail, could they know?

There is no way for Microsoft to test for such modifications. AI is a black box, including to its creators.

i0null, to microsoft
  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • kavyap
  • DreamBathrooms
  • everett
  • magazineikmin
  • InstantRegret
  • ngwrru68w68
  • Youngstown
  • mdbf
  • slotface
  • vwfavf
  • tacticalgear
  • thenastyranch
  • rosin
  • megavids
  • osvaldo12
  • ethstaker
  • GTA5RPClips
  • khanakhh
  • Durango
  • tester
  • normalnudes
  • cisconetworking
  • modclub
  • cubers
  • anitta
  • Leos
  • JUstTest
  • All magazines