Microsoft sheds more light on that Russian email theft – and how you could learn from its mistakes

Microsoft sheds more light on that Russian email theft – and how you could learn from its mistakes

January 26, 2024 at 07:39PM

Microsoft confirmed that a Kremlin-backed espionage group, Midnight Blizzard, breached its network through a non-MFA-enabled account, stealing emails and files from executives. The attackers used password spray attacks to gain access and leverage residential networks as proxies. Microsoft is urging the adoption of MFA and enhancing security measures to prevent future breaches.

The meeting notes highlight an incident where Kremlin-backed spies compromised Microsoft’s network and stole internal emails and files. The compromised corporate account lacked multi-factor authentication (MFA), allowing the attackers to gain access. The perpetrators used password spray attacks and residential broadband networks as proxies to evade detection.

Microsoft has acknowledged the security breach and emphasized the importance of enabling MFA for all user accounts, aiming to fast-track MFA across the board. The company provided guides for administrators on avoiding similar compromises.

The incident underscored the need for better security measures, with criticism from US Senator Ron Wyden for the apparent lack of MFA protection. Microsoft has recognized the urgency to enhance its security posture and review basic security hygiene.

Overall, the meeting notes provided a comprehensive account of the security breach at Microsoft and highlighted the need for stronger security measures, particularly the implementation of MFA.

Full Article