FacebookInstagramTwitterContact

 

Emergency Water Pipe Repair Work Update           >>           Miscellaneous Offences Act 2021           >>           'Operasi Sepadu'           >>           'Badudun Bersama Biskita' Roadshow           >>           Hari Raya Aidilfitri Celebration           >>           International Merchandise Trade Statistics, February 2024           >>           Handover of Financial Aid           >>           'Borneo Pulau Bersejarah' Project Launching Ceremony           >>           Doa Kesyukuran Ceremony           >>           Commemorating Mosque's 25th Anniversary           >>          

 

SHARE THIS ARTICLE




REACH US


GENERAL INQUIRY

[email protected]

 

ADVERTISING

[email protected]

 

PRESS RELEASE

[email protected]

 

HOTLINE

+673 222-0178 [Office Hour]

+673 223-6740 [Fax]

 



Upcoming Events





Prayer Times


The prayer times for Brunei-Muara and Temburong districts. For Tutong add 1 minute and for Belait add 3 minutes.


Imsak

: 05:01 AM

Subuh

: 05:11 AM

Syuruk

: 06:29 AM

Doha

: 06:51 AM

Zohor

: 12:32 PM

Asar

: 03:44 PM

Maghrib

: 06:32 PM

Isyak

: 07:42 PM

 



The Business Directory


 

 



Security & Privacy


  Home > Security & Privacy


Russian State-Sponsored Hackers Accessed The Emails Of Microsoft’s ‘Senior Leadership’


Gary Hershorn via Getty Images

 


 January 21st, 2024  |  01:23 AM  |   1007 views

ENGADGET

 

It’s the same hacking group behind the SolarWinds cyberattack.

 

A hacking group linked to a Russian intelligence agency accessed the emails of several senior Microsoft executives and other employees, the company disclosed Friday.

 

Microsoft said it detected the attack on January 12, and has determined that a hacking group known as Midnight Blizzard or Nobelium is responsible. That’s the same group behind the 2020 SolarWinds cyberattack. Microsoft and US cybersecurity officials have said Nobelium is part of Russia’s Foreign Intelligence Service (SVR).

 

“Beginning in late November 2023, the threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents,” the company wrote in a blog post.

 

The company didn’t identify which members of its “senior leadership” were targeted, but said its initial investigation suggests the group was looking for information related to itself. Company officials so far have no evidence that “customer environments, production systems, source code, or AI systems,” were accessed.

 

Though the company says the attack “was not the result of a vulnerability in Microsoft products or services,” it is taking steps to “immediately” improve the security of “Microsoft-owned legacy systems and internal business processes.” The changes “will likely cause some level of disruption,” it added.

 

 


 

Source:
courtesy of ENGADGET

by Karissa Bell

 

If you have any stories or news that you would like to share with the global online community, please feel free to share it with us by contacting us directly at [email protected]

 

Related News


Lahad Datu Murder: Remand Of 13 Students Extende

 2024-03-30 07:57:54

Cambodia Blast: 20 Soldiers Killed In Ammunition Explosion

 2024-04-28 00:52:46

Football Betting: Regulator To Meet Over 'Inaccurate' Stats Concern

 2024-04-28 00:24:48