{"id":69753,"date":"2024-01-19T23:06:43","date_gmt":"2024-01-19T23:06:43","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2024\/01\/19\/hackers-breached-microsoft-to-find-out-what-microsoft-knows-about-them-techcrunch\/"},"modified":"2024-01-19T23:06:43","modified_gmt":"2024-01-19T23:06:43","slug":"hackers-breached-microsoft-to-find-out-what-microsoft-knows-about-them-techcrunch","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2024\/01\/19\/hackers-breached-microsoft-to-find-out-what-microsoft-knows-about-them-techcrunch\/","title":{"rendered":"Hackers breached Microsoft to find out what Microsoft knows about them | TechCrunch"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\">On Friday, Microsoft disclosed that the hacking group it calls Midnight Blizzard, also known as <a href=\"https:\/\/attack.mitre.org\/groups\/G0016\/\" target=\"_blank\" rel=\"noopener\">APT29<\/a> \u2014 and widely believed to be sponsored by the Russian government \u2014 hacked some corporate email accounts, including those of the company\u2019s \u201csenior leadership team and employees in our cybersecurity, legal, and other functions.\u201d<\/p>\n<p>Curiously, the hackers didn\u2019t go after customer data or the traditional corporate information they may have normally gone after. They wanted to know more about themselves, or more specifically, they wanted to know what Microsoft knows about them, according to the company.<\/p>\n<p><h4 class=\"block--callout__title\">Contact Us<\/h4>\n<p>\t\tDo you have more information about this hack? We\u2019d love to hear from you. From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or email lorenzo@techcrunch.com. You also can contact TechCrunch via SecureDrop.\t<\/p>\n<p>\u201cThe investigation indicates they were initially targeting email accounts for information related to Midnight Blizzard itself,\u201d the company wrote <a href=\"https:\/\/msrc.microsoft.com\/blog\/2024\/01\/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/\" target=\"_blank\" rel=\"noopener\">in a blog post<\/a> and <a href=\"https:\/\/www.sec.gov\/Archives\/edgar\/data\/789019\/000119312524011295\/d708866dex991.htm\" target=\"_blank\" rel=\"noopener\">SEC disclosure<\/a>.<\/p>\n<p>According to Microsoft, the hackers used a \u201cpassword spray attack\u201d \u2014 essentially brute forcing \u2014 against a legacy account, then used that account\u2019s permissions to \u201cto access a very small percentage of Microsoft corporate email accounts.\u201d<\/p>\n<p>Microsoft did not disclose how many email accounts were breached, nor exactly what information the hackers accessed or stole.<\/p>\n<p>Company spokespeople did not immediately respond to a request for comment.<\/p>\n<p>Microsoft took advantage of news of this hack to talk about how they are going to move forward to make itself more secure.<\/p>\n<p>\u201cFor Microsoft, this incident has highlighted the urgent need to move even faster. We will act immediately to apply our current security standards to Microsoft-owned legacy systems and internal business processes, even when these changes might cause disruption to existing business processes,\u201d the company wrote. \u201cThis will likely cause some level of disruption while we adapt to this new reality, but this is a necessary step, and only the first of several we will be taking to embrace this philosophy.\u201d<\/p>\n<\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2024\/01\/19\/hackers-breached-microsoft-to-find-out-what-microsoft-knows-about-them\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Friday, Microsoft disclosed that the hacking group it calls Midnight Blizzard, also known as APT29 \u2014 and widely believed to be sponsored by the Russian government \u2014 hacked some corporate email accounts, including those of the company\u2019s \u201csenior leadership team and employees in our cybersecurity, legal, and other functions.\u201d Curiously, the hackers didn\u2019t go [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":69754,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-69753","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/69753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=69753"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/69753\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/69754"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=69753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=69753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=69753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}