{"id":15104,"date":"2019-04-16T08:10:19","date_gmt":"2019-04-16T16:10:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/04\/16\/news-8853\/"},"modified":"2019-04-16T08:10:19","modified_gmt":"2019-04-16T16:10:19","slug":"news-8853","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/16\/news-8853\/","title":{"rendered":"Hackers snab emails and more in Microsoft Outlook, Hotmail, and MSN compromise"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 16 Apr 2019 15:30:20 +0000<\/strong><\/p>\n<p>Long-time users of certain Microsoft products, such as Hotmail, MSN, and Outlook found they may be <a href=\"https:\/\/www.cnet.com\/news\/microsoft-outlook-hack-gave-full-access-to-email-contents\/\" target=\"_blank\" rel=\"noopener noreferrer\">wrapped up in a hack<\/a> grabbing snippets of email information, and in some cases, a little bit more.<\/p>\n<p>Microsoft email services have been around forever in Internet time. Yet, many users still have a few Hotmail accounts rattling around. While most have long since moved on from MSN and Hotmail to Live and Outlook, all of these email accounts are still chugging away in one form or another.<\/p>\n<p>Perhaps it\u2019s an email you\u2019ve pretty much grown up with and don\u2019t want to let go. Maybe your old Microsoft-supplied email address is tied into large portions of the MS ecosystem, and you\u2019d rather not start trying to reinvent the wheel. It could be you just appreciate the novelty of having a legacy email address, which is becoming rarer with each passing moment.<\/p>\n<p>No matter your angle, and regardless of your stance on whether a Hotmail account is <a href=\"https:\/\/www.poynter.org\/tech-tools\/2018\/not-so-hotmail-what-your-vintage-email-address-says-to-potential-employers-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">even a good idea anymore<\/a>, people still make use of them.<\/p>\n<p>This is where our tale of compromise woe begins.<\/p>\n<h3>What happened?<\/h3>\n<p>A customer support agent was <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/ywyz3x\/hackers-could-read-your-hotmail-msn-outlook-microsoft-customer-support\" target=\"_blank\" rel=\"noopener noreferrer\">compromised by hackers<\/a> and used to gain access to certain pieces of email data. If your account was for business, you\u2019re safe. If it was a free personal account, however, it might have been affected. As per the notification email from Microsoft, which appears to have <a href=\"https:\/\/www.reddit.com\/r\/microsoft\/comments\/bclnzd\/my_microsoft_account_was_compromised_does_this\/\" target=\"_blank\" rel=\"noopener noreferrer\">gone out over the weekend<\/a>:<\/p>\n<blockquote>\n<p><em>Dear customer,<\/em><\/p>\n<p><em>We have identified that a Microsoft support agent\u2019s credentials were compromised, enabling individuals outside Microsoft to access information without your Microsoft email account. This unauthorised access could have allowed unauthorised parties to access and \/ or view information related to your email account (such as your email address, folder names, the subject lines of emails, and the names of other email addresses you communicate with), but not the content of any emails or attachments, between January 1st 2019 and March 28th 2019.<\/em><\/p>\n<\/blockquote>\n<p>While Microsoft stated that no email content was pilfered, a little while after their initial reveal, they had to update their warnings to state that about 6 percent of the total affected users had, in fact, had email body content accessed.<\/p>\n<p>Microsoft hasn\u2019t revealed how many users in total were affected during the attack, which took place between January 1 and March 28, but actual email content accessed is a significant step up in severity from subject lines and contacts.<\/p>\n<h3>What steps did Microsoft take?<\/h3>\n<p>Once the attack was brought to Microsoft&#8217;s attention, they shut it down quickly. Going back to their notification email:<\/p>\n<blockquote>\n<p><em>Upon awareness of this issue, Microsoft immediately disabled the compromised credentials, prohibiting their use for any further unauthorised access&#8230;it is important to note that your email login credentials were not directly impacted by this incident. However, out of caution, you should reset your password for your account.<\/em><\/p>\n<\/blockquote>\n<p>They also advised users to be wary of <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing attacks<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/08\/social-engineering-attacks-what-makes-you-susceptible\/\" target=\"_blank\" rel=\"noopener noreferrer\">social engineering<\/a> tactics in general. All the same, information is a little thin on the ground.<\/p>\n<p>As <a href=\"https:\/\/techcrunch.com\/2019\/04\/13\/microsoft-support-agent-email-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">TechCrunch notes<\/a>, Microsoft hasn\u2019t revealed if the support account was a third party or belonged to a Microsoft employee, or which regions were impacted\u2014aside from a reference to the EU in one of the emails.<\/p>\n<p>Additionally, Microsoft claims this took place over three months; an informant for Motherboard reckons it was more like six (which Microsoft denies).<\/p>\n<h3>Next steps?<\/h3>\n<p>At this point, we\u2019d usually suggest security tips along the lines of <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/05\/dont-need-27-different-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">changing your passwords<\/a>, but this attack is tricky because it didn\u2019t involve credentials. It seems no matter how locked down your account was, the method of attack allowed hackers to see what they wanted to see.<\/p>\n<p>As Microsoft suggests, feel free to change your password if it makes you feel more reassured. If you want to <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/12428\/microsoft-account-security-info-verification-codes\" target=\"_blank\" rel=\"noopener noreferrer\">boost your online webmail account security<\/a>, there\u2019s never been a better time to begin. You might also want to rethink hanging onto those dinosaur, legacy accounts, as they are huge targets for cybercriminals.<\/p>\n<p>The biggest risk from this attack is most likely to the small<span class=\"Apple-converted-space\"> number of users<\/span> whose full email content was viewable by the hackers. With any luck, what they saw is hopefully nothing too sensitive. For our part, we recommend checking out our <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/06\/five-easy-ways-to-recognize-and-dispose-of-malicious-emails\/\" target=\"_blank\" rel=\"noopener noreferrer\">suggestions for spotting dubious emails<\/a> to cover any potential social engineering or phishing attempts spurred by this attack.<\/p>\n<p>It\u2019s definitely bad, but it could\u2019ve been a lot worse. The lesson we can hopefully learn from this one: Be thankful for small mercies.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/hackers-snab-emails-and-more-in-microsoft-outlook-hotmail-and-msn-compromise\/\">Hackers snab emails and more in Microsoft Outlook, Hotmail, and MSN compromise<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/hackers-snab-emails-and-more-in-microsoft-outlook-hotmail-and-msn-compromise\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 16 Apr 2019 15:30:20 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/hackers-snab-emails-and-more-in-microsoft-outlook-hotmail-and-msn-compromise\/' title='Hackers snab emails and more in Microsoft Outlook, Hotmail, and MSN compromise'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/shutterstock_1013607241.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Hackers made use of a compromised Microsoft support agent&#8217;s credentials to sneak a peek at its users&#8217; Hotmail, MSN, and Outlook emails. How bad is it, and what has Microsoft done to correct it?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/hacking\/\" rel=\"category tag\">Hacking<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/email\/\" rel=\"tag\">email<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hotmail\/\" rel=\"tag\">hotmail<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/live\/\" rel=\"tag\">live<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/microsoft\/\" rel=\"tag\">microsoft<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ms\/\" rel=\"tag\">ms<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/msn\/\" rel=\"tag\">msn<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/outlook\/\" rel=\"tag\">Outlook<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/hackers-snab-emails-and-more-in-microsoft-outlook-hotmail-and-msn-compromise\/' title='Hackers snab emails and more in Microsoft Outlook, Hotmail, and MSN compromise'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/hackers-snab-emails-and-more-in-microsoft-outlook-hotmail-and-msn-compromise\/\">Hackers snab emails and more in Microsoft Outlook, Hotmail, and MSN compromise<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,11222,3919,21569,21570,10516,21571,15225,13255],"class_list":["post-15104","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-email","tag-hacking","tag-hotmail","tag-live","tag-microsoft","tag-ms","tag-msn","tag-outlook"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15104"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15104\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15104"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}