{"id":23805,"date":"2024-01-26T10:45:06","date_gmt":"2024-01-26T18:45:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/01\/26\/news-17535\/"},"modified":"2024-01-26T10:45:06","modified_gmt":"2024-01-26T18:45:06","slug":"news-17535","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/01\/26\/news-17535\/","title":{"rendered":"Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/65a85ac4d4f9c4852c461f33\/master\/pass\/Vulnerable-Car-Insurance-Premiums-Calculator-Exposed-Vast-Trove-of-Indian-Customer-Data-Security-GettyImages-1530802881.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 25 Jan 2024 21:30:58 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-jWHrLH hAfVoD byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-jbHncj fuDQVo\"><span data-testid=\"BylineName\" class=\"BylineName-kwmrLn cVPPwi byline__name\"><a class=\"BaseWrap-sc-gjQpdd BaseText-ewhhUZ BaseLink-eNWuiM BylineLink-gEnFiw iUEiRd kZoQA-D ecbzIP BDKtv byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>Microsoft and Hewlett-Packard Enterprise (HPE) both recently disclosed that they suffered corporate email breaches at the hands of Russia&#x27;s \u201cMidnight Blizzard\u201d hackers.<\/p>\n<p class=\"paywall\">The group, which is tied to the Kremlin&#x27;s SVR foreign intelligence, is specifically linked to SVR&#x27;s APT 29 Cozy Bear, the gang that <a href=\"https:\/\/www.wired.com\/2016\/07\/heres-know-russia-dnc-hack\/\">meddled<\/a> in the United States 2016 presidential election, has conducted aggressive government and corporate <a href=\"https:\/\/www.wired.com\/story\/cozy-bear-dukes-russian-hackers-new-tricks\/\">espionage around the world<\/a> for years, and was behind the infamous 2021 <a href=\"https:\/\/www.wired.com\/story\/the-untold-story-of-solarwinds-the-boldest-supply-chain-hack-ever\/\">SolarWinds supply chain attack<\/a>. While both HP&#x27;s and Microsoft&#x27;s breaches came to light within days of each other, the situation mainly illustrates the ongoing reality of Midnight Blizzard&#x27;s international espionage activities and the lengths it will go to to find weaknesses in organizations&#x27; digital defenses.<\/p>\n<p class=\"paywall\">\u201cWe shouldn&#x27;t be surprised that Russian intelligence-backed threat actors, and SVR in particular, are targeting tech companies like Microsoft and HPE. With organizations that size, it would be a much bigger surprise to learn they weren&#x27;t,\u201d says Jake Williams, a former US National Security Agency hacker and current faculty member at the Institute for Applied Network Security.<\/p>\n<p class=\"paywall\">HP Enterprise said in a US Securities and Exchange Commission <a href=\"https:\/\/www.sec.gov\/ix?doc=\/Archives\/edgar\/data\/1645590\/000164559024000009\/hpe-20240119.htm\">submission<\/a> posted on Wednesday that Midnight Blizzard gained access to its \u201ccloud-based email environment\u201d last year. The company first learned about the situation on December 12, 2023, but said that the attack began in May 2023. Hackers \u201caccessed and exfiltrated data \u2026 from a small percentage of HPE mailboxes belonging to individuals in our cybersecurity, go-to-market, business segments, and other functions,\u201d the company wrote in the SEC filing. HP Enterprise said the breach likely came about as the result of another incident, discovered in June 2023, in which Midnight Blizzard also accessed and exfiltrated company \u201cSharePoint\u201d files beginning as early as May 2023. SharePoint is a much-targeted cloud collaboration platform made by Microsoft that integrates with Microsoft 365.<\/p>\n<p class=\"paywall\">\u201cThe accessed data is limited to information contained in the HPE users\u2019 email boxes,\u201d HP Enterprise spokesperson Adam Bauer told WIRED in a statement. \u201cWe continue to investigate and analyze these mailboxes to identify information that could have been accessed and will make appropriate notifications as required.\u201d<\/p>\n<p class=\"paywall\">Meanwhile, Microsoft <a data-offer-url=\"https:\/\/msrc.microsoft.com\/blog\/2024\/01\/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/msrc.microsoft.com\/blog\/2024\/01\/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/&quot;}\" href=\"https:\/\/msrc.microsoft.com\/blog\/2024\/01\/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/\" rel=\"noopener\" target=\"_blank\">said<\/a> on Friday that it detected a system intrusion on January 12 tied to a November 2023 breach. The attackers targeted and compromised some historic Microsoft system test accounts that then allowed them to access \u201ca very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions.\u201d From there the group was able to exfiltrate \u201csome emails and attached documents.\u201d Microsoft noted in its disclosure that the attackers appeared to be seeking information about Microsoft&#x27;s investigations and knowledge of Midnight Blizzard itself.<\/p>\n<p class=\"paywall\">\u201cThe attack was not the result of a vulnerability in Microsoft products or services. To date, there is no evidence that the threat actor had any access to customer environments, production systems, source code, or AI systems,\u201d the company wrote in its disclosure. \u201cThis attack does highlight the continued risk posed to all organizations from well-resourced nation-state threat actors like Midnight Blizzard.\u201d<\/p>\n<p class=\"BylineWrapper-jWHrLH cExbzu byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-jbHncj fuDQVo\"><span data-testid=\"BylineName\" class=\"BylineName-kwmrLn cYaBaU byline__name\">Dhruv Mehrotra<\/span><\/span><\/p>\n<p class=\"BylineWrapper-jWHrLH cExbzu byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-jbHncj fuDQVo\"><span data-testid=\"BylineName\" class=\"BylineName-kwmrLn cYaBaU byline__name\">Andy Greenberg<\/span><\/span><\/p>\n<p class=\"BylineWrapper-jWHrLH cExbzu byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-jbHncj fuDQVo\"><span data-testid=\"BylineName\" class=\"BylineName-kwmrLn cYaBaU byline__name\">WIRED Staff<\/span><\/span><\/p>\n<p class=\"BylineWrapper-jWHrLH cExbzu byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-jbHncj fuDQVo\"><span data-testid=\"BylineName\" class=\"BylineName-kwmrLn cYaBaU byline__name\">Matt Kamen<\/span><\/span><\/p>\n<p class=\"paywall\">In an <a data-offer-url=\"https:\/\/www.mandiant.com\/resources\/blog\/apt29-continues-targeting-microsoft\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.mandiant.com\/resources\/blog\/apt29-continues-targeting-microsoft&quot;}\" href=\"https:\/\/www.mandiant.com\/resources\/blog\/apt29-continues-targeting-microsoft\" rel=\"noopener\" target=\"_blank\">August 2022 report<\/a> from the threat intelligence firm Mandiant, incident response leader Doug Bienstock wrote that the firm \u201ccontinues to identify APT29 operations targeting the United States&#x27; (US) interests, and those of NATO and partner countries.\u201d He noted that even though the hacking group is widely known, it has continued to be \u201cextremely prolific\u201d and returns to target certain victims multiple times over months or even years. \u201cThis persistence and aggressiveness are indicative of sustained interest in this information and strict tasking by the Russian Government,\u201d Bienstock wrote, adding, \u201cMandiant has observed APT29 continue to demonstrate exceptional operational security and advanced tactics targeting Microsoft 365.\u201d<\/p>\n<p class=\"paywall\">While Midnight Blizzard is far from a new threat, researchers point out that it&#x27;s always productive to have renewed attention on the issue of persistent state-backed espionage. Williams, of the Institute for Applied Network Security, also highlights the hackers&#x27; counterintelligence goals in the recent Microsoft breach\u2014that Midnight Blizzard appeared to be specifically interested in learning what company executives know about their group and methods.<\/p>\n<p class=\"paywall\">&quot;I&#x27;m not surprised that the threat actors were observed looking for what information Microsoft had on them,\u201d Williams says. \u201cBut it&#x27;s a great piece of evidence to remind us that threat actors are regularly monitoring our own investigative efforts as defenders.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/microsoft-hpe-midnight-blizzard-email-breaches\/\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/65a85ac4d4f9c4852c461f33\/master\/pass\/Vulnerable-Car-Insurance-Premiums-Calculator-Exposed-Vast-Trove-of-Indian-Customer-Data-Security-GettyImages-1530802881.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 25 Jan 2024 21:30:58 +0000<\/strong><\/p>\n<p>Newly disclosed breaches of Microsoft and Hewlett-Packard Enterprise highlight the persistent threat posed by Midnight Blizzard, a notorious Russian cyber-espionage group.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358,21357],"class_list":["post-23805","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23805"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23805\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23805"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}