Home » today » News » China-Backed Hackers May Have Accessed Microsoft Cloud Services, Researchers Warn

China-Backed Hackers May Have Accessed Microsoft Cloud Services, Researchers Warn

Suspected China-backed hackers‌ have⁤ breached the‍ email accounts of U.S. Commerce and ​State Department officials, potentially gaining access to sensitive documents and files protected by⁣ Microsoft⁢ login‌ information,‍ according to researchers. The attackers used a stolen ⁢or forged Microsoft signing key, which allowed them to impersonate any Microsoft Exchange or Outlook email customer ​and⁣ approve access to employee inboxes. Researchers from cloud⁢ security company Wiz found that the ‍compromised key could have also been used ⁤to‌ sign into other widely used Microsoft cloud offerings, including SharePoint, ​Teams, and⁣ OneDrive. Microsoft has since revoked‍ the key, but​ Wiz ⁤warned ‍that the ⁤attackers may have left back doors in applications, and some software may still recognize a session⁤ initiated by the expired key. Microsoft downplayed the possibility that the attackers‍ had⁣ gone beyond the email accounts of their targets, which included Commerce Secretary Gina Raimondo and ⁢U.S.​ ambassador to China ⁤Nicholas Burns. The Cybersecurity and Infrastructure Security Agency stated that there was no ⁤evidence ⁤to suggest that the attackers⁢ had expanded their ​access beyond email. Microsoft has attributed the attack‌ to a Chinese group⁢ and is investigating how the signing key ⁤was obtained.
detail photograph

What are the potential implications of Chinese hackers breaching US government email accounts?

Attention-grabbing headline: Chinese Hackers Breach US Government Email Accounts, Unleashing ⁤Potential Chaos

Suspected China-backed hackers have successfully⁣ infiltrated the email accounts ​of ‍high-ranking officials from the US Commerce and State Departments, raising concerns over⁢ the exposure of sensitive documents and files protected by Microsoft login ⁢information. Researchers have⁤ discovered‍ that ⁤these ‌hackers employed a‌ stolen or forged‌ Microsoft signing key, granting them the ability to ‌masquerade as any Microsoft ‍Exchange or Outlook email user and gain‍ unfettered access to employee inboxes. Shockingly, the ‌compromised ‌key could ‌have also been used ⁢to infiltrate other widely‍ utilized Microsoft ‍cloud services such as SharePoint, ‌Teams, and ‌OneDrive. Although Microsoft has promptly nullified the key, cloud⁣ security company ⁣Wiz has ⁢issued‌ a stern warning, suggesting ‌that the perpetrators may have implemented hidden vulnerabilities in various applications. Consequently, certain ‍software systems ​may still recognize an initiated session originating from the expired key, leaving them susceptible to unauthorized access. While Microsoft has downplayed the extent of the breach, insisting that the hackers were restricted ⁤to the email accounts of their targets, which notably include Commerce Secretary Gina Raimondo and U.S. ambassador to ⁣China Nicholas Burns, doubts remain. The ​Cybersecurity and ⁣Infrastructure⁣ Security Agency⁢ asserts that there is no conclusive evidence to support ⁢the notion that the attackers have expanded their reach beyond ⁤email. Microsoft, attributing the attack to a Chinese group, is currently conducting an ⁤investigation to determine the⁤ exact method by which the signing key was obtained.

2 thoughts on “China-Backed Hackers May Have Accessed Microsoft Cloud Services, Researchers Warn”

  1. This article provides a concerning insight into the potential cyber threat posed by China-backed hackers gaining unauthorized access to Microsoft Cloud Services. The fact that such attacks could impact sensitive business data and compromise user information is alarming. Greater security measures and collaborations between governments and private tech companies are crucial to combat this growing threat.

    Reply
  2. This alarming report showcases the growing threat of state-sponsored cyber attacks on major tech companies. It underscores the urgent need for stronger cybersecurity measures to safeguard our digital infrastructure from potential breaches.

    Reply

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.