Microsoft breach led to theft of 60,000 US State Dept emails
- September 28, 2023
- 04:45 PM
- 4
- During a recent Senate staff briefing, U.S. State Department officials disclosed that the attackers stole at least 60,000 emails from Outlook accounts belonging to State Department officials stationed in East Asia, the Pacific, and Europe, as Reuters first reported.
- The compromised State Department personnel primarily focused on Indo-Pacific diplomacy efforts.
The reports were also confirmed by State Department spokesperson Matthew Miller in a press briefing on Thursday.
"Yes, it was approximately 60,000 unclassified emails that were exfiltrated as a part of that breach. No, classified systems were not hacked. These only related to the unclassified system Miller Miller told reporters.
"We have not made an attribution at this point, but, as I said before, we have no reason to doubt the attribution that Microsoft has made publicly. Again this was a hack of Microsoft systems that the State Department uncovered and notified Microsoft about."
Email breaches linked to Storm-0558 Chinese cyberspies
- The compromised organizations include the U.S. State and Commerce Departments and certain consumer accounts presumably linked to them.
- Microsoft did not disclose specific details regarding the affected organizations, government agencies, or countries impacted by this email breach.
- Earlier this month, Microsoft disclosed that the threat group first obtained a consumer signing key from a Windows crash dump, a breach facilitated after compromising the corporate account of a Microsoft engineer, which enabled access to the government email accounts.
In response to the security breach, Microsoft revoked the stolen signing key and, following investigations, found no additional instances of unauthorized access to customer accounts through the same method of access token forgery.
Under pressure from the Cybersecurity and Infrastructure Security Agency (CISA), Microsoft has also agreed to broaden access to cloud logging data at no cost, which would help network defenders identify potential breach attempts of a similar nature in the future.
State Department officials offered new details on the breach during a closed-door briefing on Wednesday, saying that most of the ten government email accounts affected were owned by people working on “Indo-Pacific diplomatic efforts,” Politico reported, citing an unnamed staffer for Republican Senator Eric Schmitt.
“Among the most sensitive information stolen, the staffer said, were victims’ travel itineraries and diplomatic deliberations,” the outlet added, noting that ten Social Security numbers were potentially accessed during the hack.
The cyber attack was first reported in July by Microsoft, which pinned the blame on a “China-based threat actor” allegedly supported by the government in Beijing. In a blog post published at the time, the company also said the hackers had “espionage objectives,” but stated its conclusions were held with only “moderate confidence.”
The highest-level officials reportedly targeted in the hack include US Ambassador to China Nicholas Burns and Commerce Secretary Gina Raimondo. Though the State Department has yet to formally implicate China in the breach, Raimondo herself has alleged Chinese responsibility in public comments.
“They did hack me, which was unappreciated to say the least,” she told NBC News earlier this month, adding that she raised the issue with her counterparts in Beijing during her last visit.
The commerce chief went on to argue that Washington is in “fierce competition with China at every level,” but insisted that “conflict is in no one’s interest,” echoing similar comments from other officials regarding US policy on China. President Joe Biden has repeatedly labeled Beijing as America’s top “competitor” and continues to bolster the US military presence in the Asia-Pacific in an effort to confront the People’s Republic.
No comments:
Post a Comment