hessen.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
hessen.social ist die Mastodongemeinschaft für alle Hessen:innen und alle, die sich Hessen verbunden fühlen

Serverstatistik:

1,7 Tsd.
aktive Profile

#midnightblizzard

0 Beiträge0 Beteiligte0 Beiträge heute
gtbarry<p>Microsoft’s breach notification emails end up in spam folder</p><p>The Russian nation-state hacker group Midnight Blizzard penetrated Microsoft’s defenses last year</p><p>“The notifications aren’t in the portal – they emailed tenant admins instead. The emails can go into spam. They also haven’t informed orgs via account managers”</p><p><a href="https://mastodon.social/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://mastodon.social/tags/Russian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russian</span></a> <a href="https://mastodon.social/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> <a href="https://mastodon.social/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p><p><a href="https://cybernews.com/news/microsofts-breach-notification-emails-end-up-in-spam-folder/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybernews.com/news/microsofts-</span><span class="invisible">breach-notification-emails-end-up-in-spam-folder/</span></a></p>
AAKL<p>Revisiting <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a>'s recent <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> fiasco. <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> </p><p>"According to Bloomberg, Microsoft also informed the US Agency for Global Media that some of its data may have been stolen. Security data and sensitive, personally identifiable information held by the agency is not believed to have been compromised. The Peace Corps was also notified of the Midnight Blizzard breach but told Bloomberg that it was able to 'mitigate the vulnerability'." </p><p>Microsoft’s <a href="https://infosec.exchange/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> source code breach also impacted federal agencies <a href="https://www.theverge.com/2024/7/4/24192159/microsoft-midnight-blizzard-hack-targets" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theverge.com/2024/7/4/24192159</span><span class="invisible">/microsoft-midnight-blizzard-hack-targets</span></a> <span class="h-card" translate="no"><a href="https://mastodon.social/@verge" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>verge</span></a></span></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> informiert betroffene Kunden von <a href="https://social.tchncs.de/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a>-Spionage | Security <a href="https://www.heise.de/news/Microsoft-informiert-betroffene-Kunden-von-Midnight-Blizzard-Spionage-9783168.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsoft-inform</span><span class="invisible">iert-betroffene-Kunden-von-Midnight-Blizzard-Spionage-9783168.html</span></a> <a href="https://social.tchncs.de/tags/CozyBear" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CozyBear</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/TeamViewer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TeamViewer</span></a>-Angriff: Die Spur führt nach <a href="https://social.tchncs.de/tags/Russland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russland</span></a> 🇷🇺 | Security <a href="https://www.heise.de/news/TeamViewer-Angriff-Die-Spur-fuehrt-nach-Russland-9782630.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/TeamViewer-Angri</span><span class="invisible">ff-Die-Spur-fuehrt-nach-Russland-9782630.html</span></a> <a href="https://social.tchncs.de/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> 🇷🇺 <a href="https://social.tchncs.de/tags/APT29" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT29</span></a> <a href="https://social.tchncs.de/tags/CozyBear" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CozyBear</span></a> <a href="https://social.tchncs.de/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://social.tchncs.de/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCrime</span></a></p>
Don Trueten :antifa:<p>Hoppla!</p><p><a href="https://mastodon.trueten.de/tags/Fernwartungssoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fernwartungssoftware</span></a> <a href="https://mastodon.trueten.de/tags/TeamViewer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TeamViewer</span></a> kompromittiert</p><p>am 27.06.2024 wurde bekannt, dass der Fernwartungs-Anbieter "TeamViewer" am 26.06.2024 Anzeichen für eine Kompromittierung seiner internen IT-Systeme durch einen professionelle Cyber-Angreifer festgestellt hat.   </p><p>Nach aktuellen Informationen könnte es sich bei dem Angreifer um die gleiche Gruppierung handeln, die für einen sogenannten "<a href="https://mastodon.trueten.de/tags/Lieferkettenangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lieferkettenangriff</span></a>" ein US-amerikanisches Unternehmen im Jahr 2020 verantwortlich gemacht wird. Beim damaligen Angriffs sind über eine <a href="https://mastodon.trueten.de/tags/Management" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Management</span></a>-Software des Anbieters tausende Kunden des Anbieters kompromittiert wurden. </p><p><a href="https://www.golem.de/news/teamviewer-gehackt-cyberangriff-trifft-populaere-fernwartungssoftware-2406-186526.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/teamviewer-gehac</span><span class="invisible">kt-cyberangriff-trifft-populaere-fernwartungssoftware-2406-186526.html</span></a> <a href="https://mastodon.trueten.de/tags/Nerdkram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nerdkram</span></a> <a href="https://mastodon.trueten.de/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a></p>
IT News<p>Microsoft ties executive pay to security following multiple failures and breaches - Enlarge / A PC running Windows 11. (credit: Microsoft) </p><p>It's be... - <a href="https://arstechnica.com/?p=2021673" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2021673</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/midnightblizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midnightblizzard</span></a> <a href="https://schleuss.online/tags/securitybreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securitybreach</span></a> <a href="https://schleuss.online/tags/storm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>storm</span></a>-0558 <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>azure</span></a> <a href="https://schleuss.online/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a></p>
Anke Domscheit-Berg<p>🎙️Folge 32 von <a href="https://linke.social/tags/DerADBPodcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DerADBPodcast</span></a> ist da! 💥 Harte Diskussionen im <a href="https://linke.social/tags/Digitalausschuss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Digitalausschuss</span></a>: <a href="https://linke.social/tags/Drohnen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Drohnen</span></a>, <a href="https://linke.social/tags/Hackerangriffe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackerangriffe</span></a>, Cyber im Krieg u mehr!🛡️💻 Hört, was Verteidigungsminister <a href="https://linke.social/tags/Pistorius" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pistorius</span></a> u <a href="https://linke.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> zu sagen hatten. Extra: Einblicke zum <a href="https://linke.social/tags/GirlsDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GirlsDay</span></a>! 👩‍💻 <a href="https://mdb.anke.domscheit-berg.de/2024/04/der-adb-podcast-32/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mdb.anke.domscheit-berg.de/202</span><span class="invisible">4/04/der-adb-podcast-32/</span></a> <br> <a href="https://linke.social/tags/Storm588" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Storm588</span></a> <a href="https://linke.social/tags/Midnightblizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Midnightblizzard</span></a> <a href="https://linke.social/tags/microsofthacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsofthacks</span></a> <a href="https://linke.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSecurity</span></a> <a href="https://linke.social/tags/Milit%C3%A4r" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Militär</span></a></p>
Not Simon<p><strong>Splunk</strong> provides a detailed analysis of the tactics, techniques, and procedures (TTPs) employed by APT29 in the campaign targeting German political parties with the new WINELOADER backdoor. APT29, aka Midnight Blizzard and Cozy Bear, is publicly attributed to Russian Foreign Intelligence Service (SVR). IOC and Yara rules provided.🔗 <a href="https://www.splunk.com/en_us/blog/security/wineloader-analysis.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">splunk.com/en_us/blog/security</span><span class="invisible">/wineloader-analysis.html</span></a></p><p><a href="https://infosec.exchange/tags/APT29" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT29</span></a> <a href="https://infosec.exchange/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://infosec.exchange/tags/CozyBear" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CozyBear</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/WINELOADER" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WINELOADER</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/IOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOC</span></a> <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://infosec.exchange/tags/cyberespionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberespionage</span></a></p>
Pyrzout :vm:<p>US Government on High Alert as Russian Hackers Steal Critical Correspondence From Microsoft <a href="https://www.securityweek.com/us-government-on-high-alert-as-russian-hackers-steal-critical-correspondence-from-microsoft/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/us-government</span><span class="invisible">-on-high-alert-as-russian-hackers-steal-critical-correspondence-from-microsoft/</span></a> <a href="https://social.skynetcloud.site/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://social.skynetcloud.site/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://social.skynetcloud.site/tags/DataBreaches" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreaches</span></a> <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/Featured" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Featured</span></a> <a href="https://social.skynetcloud.site/tags/Nobelium" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nobelium</span></a> <a href="https://social.skynetcloud.site/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://social.skynetcloud.site/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a></p>
Nick Espinosa<p>Microsoft's Russian Attack Is WAY Worse Than What We Were Told!</p><p><a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberattack</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://mastodon.social/tags/CozyBear" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CozyBear</span></a> <a href="https://mastodon.social/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://mastodon.social/tags/APT29" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT29</span></a></p><p><a href="https://youtu.be/Zb61RRCp4ZM" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/Zb61RRCp4ZM</span><span class="invisible"></span></a></p>
ComputerBase<p>Midnight Blizzard: Hacker bohren noch immer in Microsofts Systemen herum <a href="https://www.computerbase.de/2024-03/midnight-blizzard-hacker-bohren-noch-immer-in-microsofts-systemen-herum/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">computerbase.de/2024-03/midnig</span><span class="invisible">ht-blizzard-hacker-bohren-noch-immer-in-microsofts-systemen-herum/</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://mastodon.social/tags/Hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacker</span></a> <a href="https://mastodon.social/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a></p>
Bodo Menke<p>Five Eyes warning, that APT29 is going after MS customers</p><p>Why do I need a Wapo article to stumble over it? Were there any alerts in EU I missed (BSI?)? Any news on this already in European media outlets?</p><p>„Microsoft attributed the ongoing attacks to an SVR group that it calls Midnight Blizzard and that other security companies refer to as APT29 or Cozy Bear.“</p><p><a href="https://hessen.social/tags/Microsoft" class="mention hashtag" rel="tag">#<span>Microsoft</span></a> <a href="https://hessen.social/tags/M365" class="mention hashtag" rel="tag">#<span>M365</span></a> <a href="https://hessen.social/tags/O365" class="mention hashtag" rel="tag">#<span>O365</span></a> <a href="https://hessen.social/tags/EntraID" class="mention hashtag" rel="tag">#<span>EntraID</span></a> <a href="https://hessen.social/tags/AzureAD" class="mention hashtag" rel="tag">#<span>AzureAD</span></a> <a href="https://hessen.social/tags/Russia" class="mention hashtag" rel="tag">#<span>Russia</span></a> <a href="https://hessen.social/tags/SVR" class="mention hashtag" rel="tag">#<span>SVR</span></a> <a href="https://hessen.social/tags/APT29" class="mention hashtag" rel="tag">#<span>APT29</span></a> <a href="https://hessen.social/tags/MidnightBlizzard" class="mention hashtag" rel="tag">#<span>MidnightBlizzard</span></a> <a href="https://infosec.exchange/@JosephMenn/112062526327167579" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@JosephMenn/1</span><span class="invisible">12062526327167579</span></a></p>
Not Simon<p><strong>Microsoft</strong> files an amendment FORM 8-K/A with the United States Securities and Exchange Commission (SEC) regarding the Midnight Blizzard attack.<br>🔗 <a href="https://www.sec.gov/Archives/edgar/data/789019/000119312524062997/d808756d8ka.htm" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">sec.gov/Archives/edgar/data/78</span><span class="invisible">9019/000119312524062997/d808756d8ka.htm</span></a></p><blockquote><p>As disclosed in the Original Filing, the Company detected that beginning in late November 2023, a nation-state threat actor had gained access to and exfiltrated information from a very small percentage of employee email accounts including members of our senior leadership team and employees in our cybersecurity, legal, and other functions. Since the date of the Original Filing, the Company has determined that the threat actor used and continues to use information it obtained to gain, or attempt to gain, unauthorized access to some of the Company’s source code repositories and internal systems. The threat actor’s ongoing attack is characterized by a sustained, significant commitment of the threat actor’s resources, coordination, and focus. Our active investigations of the threat actor’s activities are ongoing, findings of our investigations will continue to evolve, and further unauthorized access may occur.</p></blockquote><p><a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://infosec.exchange/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/APT29" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT29</span></a> <a href="https://infosec.exchange/tags/CozyBear" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CozyBear</span></a> <a href="https://infosec.exchange/tags/cyberespionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberespionage</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/SVR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SVR</span></a> <a href="https://infosec.exchange/tags/SEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SEC</span></a></p>
Jan Penfrat<p>Is this a good moment to flee from all things <a href="https://eupolicy.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a>? </p><p><a href="https://eupolicy.social/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://eupolicy.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://eupolicy.social/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a></p><p><a href="https://arstechnica.com/security/2024/03/microsoft-says-kremlin-backed-hackers-accessed-its-source-and-internal-systems/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2024/</span><span class="invisible">03/microsoft-says-kremlin-backed-hackers-accessed-its-source-and-internal-systems/</span></a></p>
WinFuture.de<p>Mail-Hack mit Folgen: Russische Hacker klauen Quellcode von Microsoft <a href="https://mastodon.social/tags/Hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacker</span></a> <a href="https://mastodon.social/tags/Russland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russland</span></a> <a href="https://mastodon.social/tags/Mail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mail</span></a> <a href="https://mastodon.social/tags/Code" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Code</span></a> <a href="https://mastodon.social/tags/Quellcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Quellcode</span></a> <a href="https://mastodon.social/tags/PasswordSpray" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PasswordSpray</span></a> <a href="https://mastodon.social/tags/Nobelium" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nobelium</span></a> <a href="https://mastodon.social/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://winfuture.de/news,141628.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,141628.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
IT News<p>Microsoft says Kremlin-backed hackers accessed its source and internal systems - Enlarge (credit: Getty Images) </p><p>Microsoft said that Kremlin-bac... - <a href="https://arstechnica.com/?p=2008953" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2008953</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/midnightblizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midnightblizzard</span></a> <a href="https://schleuss.online/tags/sourcecode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sourcecode</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/apts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apts</span></a></p>
k3ym𖺀<p>Don't use Exchange On-Prem - It's riddled with vulnerabilities, they said.</p><p>Use Office 365 - It's way more secure, they said.</p><p>Meanwhile, MSFT leaving test OAuth accounts active, with:<br>✅ admin privileges <br>✅ weak password<br>✅ no MFA</p><p>(insert jokerclapping.gif)</p><p><a href="https://arstechnica.com/security/2024/01/in-major-gaffe-hacked-microsoft-test-account-was-assigned-admin-privileges/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2024/</span><span class="invisible">01/in-major-gaffe-hacked-microsoft-test-account-was-assigned-admin-privileges/</span></a></p><p><a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/midnightblizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midnightblizzard</span></a> <a href="https://infosec.exchange/tags/apt29" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt29</span></a></p>
Karl Voit :emacs: :orgmode:<p><span class="h-card" translate="no"><a href="https://cybervillains.com/@alex" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>alex</span></a></span> (this one: <a href="https://en.wikipedia.org/wiki/Alex_Stamos" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Alex_Sta</span><span class="invisible">mos</span></a>) on the latest <a href="https://graz.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> Security Team hack allegedly by <a href="https://graz.social/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> and Microsoft's public incident response including appropriate "translations" by Alex:</p><p>"Microsoft's Dangerous Addiction To <a href="https://graz.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> Revenue" <a href="https://www.linkedin.com/pulse/microsofts-dangerous-addiction-security-revenue-alex-stamos-1ukzc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/pulse/microsofts-</span><span class="invisible">dangerous-addiction-security-revenue-alex-stamos-1ukzc</span></a></p><p>TL;DR: MS fucks up big time and is using that for selling more of their security services. <a href="https://graz.social/tags/ethics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethics</span></a> </p><p>Background: <a href="https://www.wired.com/story/microsoft-hpe-midnight-blizzard-email-breaches/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/microsoft-hpe-</span><span class="invisible">midnight-blizzard-email-breaches/</span></a></p><p><a href="https://graz.social/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://graz.social/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://graz.social/tags/AzureAD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AzureAD</span></a> <a href="https://graz.social/tags/complexity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>complexity</span></a></p>
d0pp3l6ang3r :verified: :donor:<p>More details on <a href="https://infosec.exchange/tags/midnightblizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midnightblizzard</span></a> ttp: targeted and precise password sprays to OAuth app chess moves. They must have had cloud app admin or global admin adjacent permissions to be able to this. </p><p><a href="https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">microsoft.com/en-us/security/b</span><span class="invisible">log/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/</span></a></p><p><a href="https://infosec.exchange/tags/sectoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sectoot</span></a><br><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <br><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Matt Willemsen<p>Microsoft got hacked by state sponsored group it was investigating<br><a href="https://www.malwarebytes.com/blog/news/2024/01/microsoft-got-hacked-by-state-sponsored-group-it-was-investigating" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malwarebytes.com/blog/news/202</span><span class="invisible">4/01/microsoft-got-hacked-by-state-sponsored-group-it-was-investigating</span></a> <a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/statesponsored" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>statesponsored</span></a> <a href="https://mastodon.social/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://mastodon.social/tags/attack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attack</span></a></p>