Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

admin
Pinned July 11, 2021

<> Embed

@  Email

Report

Uploaded by user
Microsoft customer support agent compromised in attacks by SolarWinds’ hackers
<> Embed @  Email Report

Microsoft customer support agent compromised in attacks by SolarWinds’ hackers

Microsoft customer support rep compromised by hackers behind SolarWinds breach

But the campaign was mostly unsuccessful, Microsoft said.

Mariella Moon
M. Moon
June 26th, 2021
Microsoft customer support agent compromised in attacks by SolarWinds' hackers | DeviceDaily.com
Jean-Luc Ichard via Getty Images

The group behind the massive SolarWinds hacks recently launched another cyberattack campaign, and one of the victims was a Microsoft customer support agent. Microsoft has revealed in a blog post that it’s tracking new activity from the group christened as Nobelium. “This recent activity was mostly unsuccessful,” the company said, and the group failed to infiltrate most of the targets. The attackers managed to compromise at least three entities, however, and Microsoft also found information-stealing malware on one of its customer support agents’ machines as part its current investigation.

At the moment, the tech giant is still looking into the methods the attackers used, but it has seen evidence of password spray and brute-force attacks so far. It didn’t name the three compromised entities in its initial report, and it also didn’t say whether the attackers got their information from the machine owned by the company’s customer support rep. Microsoft did admit, however, that the machine had access to basic account information for a small number of its customers and that the bad actors used that info to launch highly targeted attacks.

The company said it responded quickly and was able to remove the group’s access to its customer service agent’s device. It has also alerted the compromised entities and all other targets through its nation-state notification process. US officials believe Russia was behind the SolarWinds hacks and previously linked Nobelium to the country’s intelligence agency. (“The latest cyberattack reported by Microsoft does not involve our company or our customers in any way,” a SolarWinds spokesperson said in a statement.)

Just last month, Microsoft discovered that the same group has been running a sophisticated email-based spear-phishing campaign targeting government agencies, think tanks and non-governmental organizations. It sent out infected emails to its targets after infiltrating the mass mailing service used by the United States Agency for International Development or USAID. This new campaign focused more on IT companies, though it also targeted government organizations and NGOs to a smaller extent. Like in its previous activities, Nobelium mostly went for entities based in the US in this recent series of attacks. Around 10 percent of the targets is based in UK, while a smaller number is based in Germany and Canada. 

 

Engadget

(32)