Us Government Email Breach: Chinese hackers breach US government email accounts, says Microsoft – Times of India

Microsoft has revealed that around 25 organisations, including US government agencies, had their email accounts compromised by Chinese hackers. These organisations were targeted in a suspected cyber-espionage campaign, Microsoft researchers and officials confirmed, which aimed at accessing sensitive data in computer networks.
The revelation comes just weeks after Beijing denied reports of China-based hackers targeting US entities, dismissing them as “far-fetched and unprofessional.”
According to a blog post by Microsoft, a breach was carried out by a China-based actor known as Storm-0558 on 25 organisational accounts, as well as consumer accounts that were linked to these organisations.
Microsoft’s report on the breach reveals that Storm-0558’s main objectives are espionage, data theft, and credential access. The actor primarily targets government agencies located in Western Europe.
As per the report, the hackers exploited a security vulnerability in their cloud-computing system, which has since been resolved. The hackers managed to infiltrate accounts that used Microsoft’s Outlook email service, forging authentication tokens, which allowed them to impersonate a user.
Based on the level of complexity and specificity of the attack, it is likely that the Chinese hacking group was either affiliated with or working for Beijing’s intelligence service. In a recent blog post, Microsoft’s executive vice president, Charlie Bell, stated that this adversary’s primary objective is espionage, specifically gaining access to email systems for intelligence-gathering purposes.
Microsoft was first informed about an intrusion and compromise on June 16. According to the company’s blog post, a Chinese hacking group gained access to email accounts on May 15, a month prior. However, Microsoft has not disclosed the number of accounts that may have been affected by these hackers.
“We have been working with the impacted customers and notifying them prior to going public with further details,” Microsoft said in its blog post. The US government officials have asked for further information about the vulnerability and its cause from the company, as per a source familiar with the breach.

function loadGtagEvents(isGoogleCampaignActive) { if (!isGoogleCampaignActive) { return; } var id = document.getElementById('toi-plus-google-campaign'); if (id) { return; } (function(f, b, e, v, n, t, s) { t = b.createElement(e); t.async = !0; t.defer = !0; t.src = v; t.id = 'toi-plus-google-campaign'; s = b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t, s); })(f, b, e, 'https://www.googletagmanager.com/gtag/js?id=AW-877820074', n, t, s); };

window.TimesApps = window.TimesApps || {}; var TimesApps = window.TimesApps; TimesApps.toiPlusEvents = function(config) { var isConfigAvailable = "toiplus_site_settings" in f && "isFBCampaignActive" in f.toiplus_site_settings && "isGoogleCampaignActive" in f.toiplus_site_settings; var isPrimeUser = window.isPrime; if (isConfigAvailable && !isPrimeUser) { loadGtagEvents(f.toiplus_site_settings.isGoogleCampaignActive); loadFBEvents(f.toiplus_site_settings.isFBCampaignActive); } else { var JarvisUrl="https://jarvis.indiatimes.com/v1/feeds/toi_plus/site_settings/643526e21443833f0c454615?db_env=published"; window.getFromClient(JarvisUrl, function(config){ if (config) { loadGtagEvents(config?.isGoogleCampaignActive); loadFBEvents(config?.isFBCampaignActive); } }) } }; })( window, document, 'script', );

For all the latest Technology News Click Here 

Read original article here

Denial of responsibility! TechAI is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.