Russian hackers stole federal correspondence with Microsoft
WHAT? JUST NOW --- Russian government-linked hackers stole correspondence between a number of U.S. federal agencies and Microsoft in a monthslong hack this year, the Cybersecurity and Infrastructure Security Agency said Thursday.
CISA's new emergency directive is the first time the U.S. government confirmed that federal agency emails were exfiltrated in the January Microsoft Exchange breaches.
Russian government-linked hackers stole correspondence between a number of U.S. federal agencies and Microsoft in a months-long hack this year, the Cybersecurity and Infrastructure Security Agency said Thursday.
- While the hack itself has been known since January, CISA’s disclosure is the first acknowledgment that federal agency emails with Microsoft were stolen.
The extent of the Russian hack was spelled out in an emergency directive issued by CISA on April 2 to federal agencies and made public on Thursday. It ordered agencies to take steps to immediately identify all compromised email correspondence, and to reset credentials for those accounts.
The directive was reported last week by CyberScoop, but without mention that the correspondence between Microsoft and federal agencies was specifically targeted.
- The directive reported that Russian hacking group Midnight Blizzard breached email accounts at an undisclosed number of federal agencies and stole emails between Microsoft and the agencies.
- Midnight Blizzard is Microsoft’s name for the prolific Russian government hackers behind the 2016 attack on the Democratic National Committee and for the SolarWinds hack in 2020 that led to the compromise of around a dozen U.S. federal agencies.
- Goldstein would not comment on the number of agencies impacted by the breach.
Intensification:
The directive described the breach as “a grave and unacceptable risk to agencies.”
CISA also notes in the document that Microsoft informed the agency that after the initial breach in January, Microsoft saw a “10-fold” increase in the attack overall, including mass efforts to use passwords from other compromised accounts.
CISA noted in the directive that Microsoft had notified all affected agencies, and that Microsoft was providing metadata for all compromised emails. Microsoft noted in a statement Thursday, “as we discover secrets in our exfiltrated email, we are working with our customers to help them investigate and mitigate. This includes working with CISA on an emergency directive to provide guidance to government agencies.”
John Sakellariadis contributed to this report.
Microsoft and the U.S. cybersecurity agency have already notified all federal agencies whose email correspondence with Microsoft was detected as exfiltrated by the Russian hackers.
CISA has now ordered affected agencies to identify the full content of the agency correspondence with compromised Microsoft accounts and perform a cybersecurity impact analysis by April 30, 2024.
John Sakellariadis contributed to this report.
Cyberattacks & Data Breaches recent news | Dark Reading
CISA orders agencies impacted by Microsoft hack to mitigate risks
- April 11, 2024
- 01:47 PM
- 0

CISA has issued a new emergency directive ordering U.S. federal agencies to address risks resulting from the breach of multiple Microsoft corporate email accounts by the Russian APT29 hacking group.
- Emergency Directive 24-02 was issued to Federal Civilian Executive Branch (FCEB) agencies on April 2.
- It requires them to investigate potentially affected emails, reset any compromised credentials (if any), and take measures to secure privileged Microsoft Azure accounts.
"This Emergency Directive requires immediate action by agencies to reduce risk to our federal systems. For several years, the U.S. government has documented malicious cyber activity as a standard part of the Russian playbook; this latest compromise of Microsoft adds to their long list," said CISA Director Jen Easterly on Thursday.
"We will continue efforts in collaboration with our federal government and private sector partners to protect and defend our systems from such threat activity."
Federal agencies' emails stolenMicrosoft and the U.S. cybersecurity agency have already notified all federal agencies whose email correspondence with Microsoft was detected as exfiltrated by the Russian hackers.
CISA has now ordered affected agencies to identify the full content of the agency correspondence with compromised Microsoft accounts and perform a cybersecurity impact analysis by April 30, 2024.
Those who detect signs of authentication compromises are required to:
- Take immediate remediation action for tokens, passwords, API keys, or other authentication credentials known or suspected to be compromised.
- For any known or suspected authentication compromises identified through action 1 by April 30, 2024:
- Reset credentials in associated applications and deactivate associated applications that are no longer of use to the agency.
- Review sign-in, token issuance, and other account activity logs for users and services whose credentials were suspected or observed as compromised for potential malicious activity.
Even though ED 24-02 requirements exclusively apply to FCEB agencies, the exfiltration of Microsoft corporate accounts may impact other organizations, which are urged to seek guidance from their respective Microsoft account teams.
It's also essential that all organizations, regardless of the impact, adopt strict security measures, including using strong passwords, enabling multifactor authentication (MFA) whenever possible, and refraining from sharing unprotected sensitive information via unsecured channels.
APT29's Microsoft hacks
In January, Microsoft revealed that APT29 hackers (also tracked as Midnight Blizzard and NOBELIUM) had breached its corporate email servers following a password spray attack that led to the compromise of a legacy non-production test tenant account.
- The company later disclosed that the test account didn't have MFA enabled, allowing the hackers to access Microsoft's systems.
- The account also had access to an OAuth application with elevated access to Microsoft's corporate environment, which let the attackers access and steal data from corporate mailboxes.
- These email accounts belonged to Microsoft's leadership team members and an undisclosed number of employees in the company's cybersecurity and legal departments.
Microsoft later confirmed the attack allowed the Russian hacking group to steal source code for some Azure, Intune, and Exchange components.
In June 2021, the APT29 hackers again breached a Microsoft corporate account, providing them access to customer support tools.
In June 2021, the APT29 hackers again breached a Microsoft corporate account, providing them access to customer support tools.
Related Articles:
Microsoft still unsure how hackers stole MSA key in 2023 Exchange attack
Microsoft expands free logging capabilities after May breach
CISA says Sisense hack impacts critical infrastructure orgs
Acuity confirms hackers stole non-sensitive govt data from GitHub repos
US State Department investigates alleged theft of government datac
Microsoft still unsure how hackers stole MSA key in 2023 Exchange attack
Microsoft expands free logging capabilities after May breach
CISA says Sisense hack impacts critical infrastructure orgs
Acuity confirms hackers stole non-sensitive govt data from GitHub repos
US State Department investigates alleged theft of government datac







No comments:
Post a Comment