Russian hackers stole Microsoft’s source code repositories

Hotstar in UAE
Hotstar in UAE

Microsoft is grappling with the aftermath of a nation-state attack, revealed earlier this year, perpetrated by the group known as Midnight Blizzard or Nobelium. Initially targeting the company’s corporate email systems, the attack has now extended to compromising source code repositories and internal systems, Microsoft disclosed in a recent blog post. This breach poses significant concerns as hackers exploit exfiltrated data from Microsoft’s corporate email systems to gain or attempt to gain unauthorized access. Reportedly, this includes access to some of the company’s source code repositories and internal systems.

Midnight Blizzard attempted to leverage shared secrets between Microsoft and its customers

The attack, attributed to Midnight Blizzard, has evidence that suggests attempts to leverage stolen information. It includes shared secrets between Microsoft and its customers. Microsoft emphasizes that while there is no evidence of compromise to customer-facing systems, the breach underscores the importance of proactive security measures from the company.

Password spray attacks have seen a 10-fold increase in volume since the attack in January. As HYPR notes, this is a type of brute force attack. Threat actors utilize a large dictionary of potential passwords for this purpose. They attempt a single password on many accounts. Then they move on to the next one and repeat the process.  In the context of the Windows maker, it indicates a sustained and coordinated effort to infiltrate the company’s infrastructure.

Despite ongoing investigations into Midnight Blizzard’s activities, the threat landscape remains challenging. Microsoft acknowledges the unprecedented scale of the global threat landscape. The company notes, “It [Midnight Blizzard] may be using the information it has obtained to accumulate a picture of areas to attack and enhance its ability to do so.”

Microsoft says they are taking measures to improve their security infrastructure

Microsoft’s response to the ongoing attack includes bolstering security controls, detection mechanisms, and monitoring capabilities across its infrastructure. “Across Microsoft, we have increased our security investments, cross-enterprise coordination, and mobilization, and have enhanced our ability to defend ourselves and secure and harden our environment against this advanced persistent threat,” notes Microsoft in a recent blog post. “We have and will continue to put in place additional enhanced security controls, detections, and monitoring.”

The company also remains committed to sharing insights from its investigations to enhance industry-wide resilience against cyber threats.

While details of the compromised source code and internal systems remain undisclosed, the breach highlights the need for organizations to prioritize cybersecurity readiness. Microsoft’s experience serves as a stark reminder of the ever-present threat posed by determined adversaries. It necessitates a proactive approach to safeguarding sensitive data and critical infrastructure.

2024-03-11 15:07:41