menu-control
The Jerusalem Post
The Jerusalem Post: Business and Innovation

Microsoft says Russian state-sponsored hackers spied on its executives

 
 Microsoft logo is seen near computer motherboard in this illustration taken January 8, 2024. (photo credit: REUTERS/DADO RUVIC/ILLUSTRATION/FILE PHOTO)
Microsoft logo is seen near computer motherboard in this illustration taken January 8, 2024.
(photo credit: REUTERS/DADO RUVIC/ILLUSTRATION/FILE PHOTO)

The company said the hackers used a "password spray attack" starting in Nov. 2023 to breach a Microsoft platform.

Microsoft said on Friday that a Russian state-sponsored group hacked into its corporate systems on January 12 and stole some emails and documents from staff accounts.

The Russian group was able to access "a very small percentage" of Microsoft corporate email accounts, including members of its senior leadership team and employees in its cybersecurity, legal, and other functions, the company said.

Microsoft's threat research team routinely investigates nation-state hackers such as Russia's "Midnight Blizzard," who they say is responsible.

The company said its probe into the breach indicated the hackers were initially targeting Microsoft to learn what the technology giant knew about their operations.

Advertisement

The company said the hackers used a "password spray attack" starting in Nov. 2023 to breach a Microsoft platform. Hackers use this technique to infiltrate a company's systems by using the same compromised password against multiple related accounts.

 Hacker (credit: SHUTTERSTOCK)
Hacker (credit: SHUTTERSTOCK)

The Russian Embassy in Washington and the Ministry of Foreign Affairs did not immediately respond to a request for comment.

Incident investigated by Microsoft

Microsoft said it investigated the incident and disrupted the malicious activity, blocking the group's access to its systems.

"This attack does highlight the continued risk posed to all organizations from well-resourced nation-state threat actors like Midnight Blizzard," the company said, noting that the attack was not the result of a specific vulnerability in its products or services.


Stay updated with the latest news!

Subscribe to The Jerusalem Post Newsletter


"To date, there is no evidence that the threat actor had any access to customer environments, production systems, source code, or AI systems," a company blog reads.

Microsoft's disclosure follows a new regulatory requirement implemented by the US Securities and Exchange Commission (SEC) in December that mandates publicly-owned companies to promptly disclose cyber incidents. Affected companies must file a report about a hack's impact within four business days of discovery - disclosing the time, scope, and nature of the breach to the government.

Advertisement

Midnight Blizzard is also known as APT29, Nobelium, or Cozy Bear by cybersecurity researchers and is linked to Russia's SVR spy agency, according to US officials. The group is best known for its intrusions into the Democratic National Committee surrounding the 2016 US election.

Microsoft products are widely used across the US government. The company faced criticism last year for its security practices after Chinese hackers stole emails belonging to senior US State Department officials.

×
Email:
×
Email: