Current:Home > ContactMicrosoft says state-backed Russian hackers accessed emails of senior leadership team members -StockPrime
Microsoft says state-backed Russian hackers accessed emails of senior leadership team members
View
Date:2025-04-19 03:31:08
BOSTON (AP) — State-backed Russian hackers broke into Microsoft’s corporate email system and accessed the accounts of members of the company’s leadership team, as well as those of employees on its cybersecurity and legal teams, the company said Friday.
In a blog post, Microsoft said the intrusion began in late November and was discovered on Jan. 12. It said the same highly skilled Russian hacking team behind the SolarWinds breach was responsible.
“A very small percentage” of Microsoft corporate accounts were accessed, the company said, and some emails and attached documents were stolen.
A company spokesperson said Microsoft had no immediate comment on which or how many members of its senior leadership had their email accounts breached. In a regulatory filing Friday, Microsoft said it was able to remove the hackers’ access from the compromised accounts on or about Jan. 13.
“We are in the process of notifying employees whose email was accessed,” Microsoft said, adding that its investigation indicates the hackers were initially targeting email accounts for information related to their activities.
The Microsoft disclosure comes a month after a new U.S. Securities and Exchange Commission rule took effect that compels publicly traded companies to disclose breaches that could negatively impact their business. It gives them four days to do so unless they obtain a national-security waiver.
In Friday’s SEC regulatory filing, Microsoft said that “as of the date of this filing, the incident has not had a material impact” on its operations. It added that it has not, however, “determined whether the incident is reasonably likely to materially impact” its finances.
Microsoft, which is based in Redmond, Washington, said the hackers from Russia’s SVR foreign intelligence agency were able to gain access by compromising credentials on a “legacy” test account, suggesting it had outdated code. After gaining a foothold, they used the account’s permissions to access the accounts of the senior leadership team and others. The brute-force attack technique used by the hackers is called “password spraying.”
The threat actor uses a single common password to try to log into multiple accounts. In an August blog post, Microsoft described how its threat-intelligence team discovered that the same Russian hacking team had used the technique to try to steal credentials from at least 40 different global organizations through Microsoft Teams chats.
“The attack was not the result of a vulnerability in Microsoft products or services,” the company said in the blog. “To date, there is no evidence that the threat actor had any access to customer environments, production systems, source code, or AI systems. We will notify customers if any action is required.”
Microsoft calls the hacking unit Midnight Blizzard. Prior to revamping its threat-actor nomenclature last year, it called the group Nobelium. The cybersecurity firm Mandiant, owned by Google, calls the group Cozy Bear.
In a 2021 blog post, Microsoft called the SolarWinds hacking campaign “the most sophisticated nation-state attack in history.” In addition to U.S. government agencies, including the departments of Justice and Treasury, more than 100 private companies and think tanks were compromised, including software and telecommunications providers.
The main focus of the SVR is intelligence-gathering. It primarily targets governments, diplomats, think tanks and IT service providers in the U.S. and Europe.
veryGood! (459)
Related
- Former Danish minister for Greenland discusses Trump's push to acquire island
- What NFL games are today: Schedule, time, how to watch Thursday action
- Tulane’s public health school secures major gift to expand
- ‘Agatha All Along’ sets Kathryn Hahn’s beguiling witch on a new quest — with a catchy new song
- Biden administration makes final diplomatic push for stability across a turbulent Mideast
- Raven-Symoné Says Demi Lovato Was Not the Nicest on Sonny with a Chance—But Doesn't Hold It Against Her
- Jon Gruden wants to return to coaching. Could he find spot in college football?
- Emily in Paris’ Lily Collins Has Surprising Pick for Emily Cooper's One True Love
- Jamie Foxx gets stitches after a glass is thrown at him during dinner in Beverly Hills
- These evangelicals are voting their values — by backing Kamala Harris
Ranking
- At site of suspected mass killings, Syrians recall horrors, hope for answers
- California’s cap on health care costs is the nation’s strongest. But will patients notice?
- Leave your finesse at the door: USC, Lincoln Riley can change soft image at Michigan
- Sheriff’s posting of the mugshot of a boy accused of school threat draws praise, criticism
- Louvre will undergo expansion and restoration project, Macron says
- Brewers clinch NL Central Division title with Cubs' loss to A's
- North Carolina’s highest court hears challenge to law allowing more time for child sex abuse suits
- North Carolina’s highest court hears challenge to law allowing more time for child sex abuse suits
Recommendation
'No Good Deed': Who's the killer in the Netflix comedy? And will there be a Season 2?
Families of Americans detained in China share their pain and urge US to get them home
Two Georgia deaths are tied to abortion restrictions. Experts say abortion pills they took are safe
Almost 2,000 pounds of wiener products recalled for mislabeling and undeclared allergens
Spooky or not? Some Choa Chu Kang residents say community garden resembles cemetery
Authorities find body believed to be suspect in Kentucky highway shooting
Testimony begins in trial for ex-sergeant charged in killing of Virginia shoplifting suspect
Arch Manning to get first start for No. 1 Texas as Ewers continues recovery from abdomen strain