Current:Home > reviewsMicrosoft says Chinese hackers breached email, including U.S. government agencies -AssetTrainer
Microsoft says Chinese hackers breached email, including U.S. government agencies
View
Date:2025-04-25 01:45:03
Tech giant Microsoft disclosed on Tuesday evening that it discovered a group of Chinese hackers had broken into some of its customers' email systems to gather intelligence.
The company began investigating unusual activity within a few weeks of the initial attack, though the culprits were able to repeatedly manipulate credentials to access accounts.
According to the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency, one federal government agency first detected unusual activity on its Microsoft 365 email cloud environment last month, and immediately reported the activity to Microsoft and CISA.
CISA did not identify the government agency in question in a blog post published on Wednesday concerning the breach.
However, a State Department spokesperson said later on Wednesday that the department "detected anomalous activity" and "took immediate steps to secure our systems," suggesting it may have been the agency to first alert Microsoft to the problem. The State Department declined to comment further on its cybersecurity incident response, which "remains under active investigation," according to the spokesperson.
The hackers, which Microsoft identified as China-based actors from a group it calls Storm-0558, were able to break in and steal some data from the accounts, according to CISA's blog post. However, the data that was taken was unclassified, according to CISA.
It's unclear how many U.S. government agencies were targets, and what exactly was stolen. However, Microsoft says the attack is now contained.
The breach reveals the ongoing challenge of keeping sophisticated actors out of systems. Microsoft describes the hackers as "well-resourced" and "focused on espionage."
However, this is not the first time Microsoft has been the target of this kind of breach. The U.S. government is putting pressure on companies to hold high security standards.
"Last month, U.S. government safeguards identified an intrusion in Microsoft's cloud security, which affected unclassified systems. Officials immediately contacted Microsoft to find the source and vulnerability in their cloud service," wrote Adam Hodge, the acting senior director for press at the White House's National Security Council, in a statement. "We continue to hold the procurement providers of the U.S. Government to a high security threshold."
The spy game
These kinds of hacks are, unfortunately, a common part of the spy game — a game of breaches and patches, protection and response between the U.S. and its adversaries.
The goal is to limit the number of vulnerabilities available for adversaries to exploit, as well as the time hackers are able to lurk inside systems without being detected. Additionally, it's especially important for agencies to protect more sensitive information outside of online email systems. That goes especially for organizations that are attractive targets to spies, from U.S. government agencies to critical infrastructure companies, defense contractors and others.
In this case, CISA confirms that it is Microsoft's responsibility to patch the vulnerability and enhance security for authentication procedures, to prevent hackers from mimicking authorized users.
Even so, CISA advises organizations to be on high alert for suspicious activity, given the recent breach. In an advisory, the agency outlines procedures for enhanced monitoring and logging as well as how to contact Microsoft if suspicious activity is detected.
"Critical infrastructure organizations are strongly urged to implement the logging recommendations in this advisory to enhance their cybersecurity posture and position themselves to detect similar malicious activity," wrote CISA.
Asma Khalid contributed to this story.
veryGood! (12)
Related
- Opinion: Gianni Infantino, FIFA sell souls and 2034 World Cup for Saudi Arabia's billions
- What does a jellyfish sting look like? Here's everything you need to know.
- How to Score Your Favorite Tarte Cosmetics Concealer for Just $1 and Get Free Shipping
- Homes are selling below list price. That's bad for sellers, good for buyers
- Meet the volunteers risking their lives to deliver Christmas gifts to children in Haiti
- Steelers cornerback Cameron Sutton suspended 8 games by NFL for violating conduct policy
- Emma Watson Confirms New Romance With Oxford Classmate Kieran Brown
- Federal judge rules protesters can’t march through Republican National Convention security zone
- Residents worried after ceiling cracks appear following reroofing works at Jalan Tenaga HDB blocks
- Topical gel is latest in decades-long quest for hormonal male birth control
Ranking
- McKinsey to pay $650 million after advising opioid maker on how to 'turbocharge' sales
- Shannon Beador Breaks Silence on Her Ex John Janssen and Costar Alexis Bellino's Engagement Plans
- Overall health of Chesapeake Bay gets C-plus grade in annual report by scientists
- Dan Hurley contract details as UConn coach signs new six-year, $50 million contract
- From family road trips to travel woes: Americans are navigating skyrocketing holiday costs
- Man charged with killing, dismembering transgender teen he met through dating app
- What is Project 2025? What to know about the conservative blueprint for a second Trump administration
- Tour de France standings, results: Belgium's Jasper Philipsen prevails in Stage 10
Recommendation
Where will Elmo go? HBO moves away from 'Sesame Street'
Doomsday cult leader Paul Mackenzie goes on trial after deaths of over 400 followers in Kenya
Mississippi inmate gets 30 year-year sentence for sexual assault of prison employee
Georgia slave descendants submit signatures to fight zoning changes they say threaten their homes
Retirement planning: 3 crucial moves everyone should make before 2025
The Biggest Bombshells From Alec Baldwin's Rust Shooting Trial for Involuntary Manslaughter
AP PHOTOS: From the Caribbean to Texas, Hurricane Beryl leaves a trail of destruction
Beryl leaves millions without power, heads toward Mississippi: See outage map