Skip to content

Unbeknownst to Microsoft users, potential hackers might possess extended data access that extends beyond Outlook, according to security analysts' concerns.

Microsoft challenges assertions by Wiz that potentially vulnerable encryption keys could have granted a sophisticated cyber group (APT actor) unauthorized access to SharePoint, Teams, and OneDrive data.

Could indicate that potential intruders might have access to more Microsoft data than just Outlook...
Could indicate that potential intruders might have access to more Microsoft data than just Outlook emails, according to experts' cautions.

Unbeknownst to Microsoft users, potential hackers might possess extended data access that extends beyond Outlook, according to security analysts' concerns.

Microsoft recently made a significant announcement, enabling security logging data by default to bolster the protection of its users. However, the tech giant has been grappling with a serious security incident, as reported by cybersecurity firm Wiz.

According to Wiz's findings, at least 25 customers, including multiple government clients, have been hacked by an advanced persistent threat group known as Storm-0558. The scope of the breach may be broader than initially thought, as the hackers are suspected to have gained access to sensitive State Department emails and potentially affected applications beyond Outlook.

The threat actors are believed to have exploited vulnerabilities in Microsoft Azure Active Directory (AD), extending the compromise beyond SharePoint, Teams, and OneDrive. Wiz's teams observed complex attack chains involving privilege escalation and impersonation within Active Directory environments, suggesting a more extensive intrusion than previously assumed.

One concerning aspect of this incident is the compromise of an MSA consumer signing key. This key provides access to a wide range of applications beyond Exchange Online and Outlook.com. The compromised private encryption key may have enabled hackers to forge access tokens for multiple Azure Active Directory applications, including SharePoint, Teams, and OneDrive.

Microsoft has issued recommendations for its customers, urging them to review their blogs, particularly the Microsoft Threat Intelligence blog, to learn more about this incident and investigate their own environments using the indicators of compromise made public by Microsoft.

Following notification from government officials, the Cybersecurity and Infrastructure Security Agency (CISA) collaborated with Microsoft on measures to contain the damage and further investigate the original access.

It is important to note that the claims made in the Wiz report are speculative and not evidence-based, according to Microsoft. Users are advised to ensure that their applications do not use a cached version of Microsoft OpenID public certificates. If they do, the cache should be refreshed to minimize potential risks.

Wiz researchers also recommend organizations to search for forged token usage on any applications that might have been affected. As the full impact of the threat actor's actions is not yet fully understood, vigilance and proactive measures are crucial in safeguarding digital assets.

A report about this matter was released on Friday by Wiz, shedding light on a concerning cybersecurity incident that underscores the importance of robust security measures in today's digital landscape.

  1. The encryption of users' security logging data by Microsoft by default is intended to strengthen their protection, despite the company facing a serious cybersecurity incident.
  2. According to Wiz, at least 25 customers, some of which are government clients, have been hacked by a sophisticated threat group called Storm-0558, with the breach potentially affecting more applications than initially thought.
  3. The hackers are believed to have exploited vulnerabilities in Microsoft Azure Active Directory, allowing them to infiltrate SharePoint, Teams, and OneDrive, among other applications.
  4. The compromised private encryption key may have allowed hackers to forge access tokens for various Azure Active Directory applications, increasing the potential damage.
  5. Microsoft has advised its customers to consult its Microsoft Threat Intelligence blog for more information about the incident and to investigate their own environments using the indicators of compromise provided by the company.
  6. Following intervention from government officials, the Cybersecurity and Infrastructure Security Agency collaborated with Microsoft to contain the damage and further investigate the original access.
  7. Wiz's report highlights the need for robust cybersecurity measures, as the digital landscape continues to be threatened by advanced persistent threat groups like Storm-0558, and vigilance is crucial in safeguarding personal-finance, wealth-management, business, general-news, crime-and-justice, politics, data-and-cloud-computing, finance, and investing sectors.

Read also:

    Latest