{"id":7609,"date":"2024-01-26T10:07:48","date_gmt":"2024-01-26T10:07:48","guid":{"rendered":"http:\/\/thisbiginfluence.com\/?p=7609"},"modified":"2024-01-26T10:07:49","modified_gmt":"2024-01-26T10:07:49","slug":"big-name-targets-push-midnight-blizzard-hacking-spree-back-into-the-limelight","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=7609","title":{"rendered":"Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Microsoft and Hewlett-Packard Enterprise (HPE) each lately disclosed that they suffered company electronic mail breaches by the hands of Russia&#8217;s \u201cMidnight Blizzard\u201d hackers.<\/p>\n<p class=\"paywall\">The group, which is tied to the Kremlin&#8217;s SVR international intelligence, is particularly linked to SVR&#8217;s APT 29 Cozy Bear, the gang that <a href=\"https:\/\/www.wired.com\/2016\/07\/heres-know-russia-dnc-hack\/\">meddled<\/a> in the USA 2016 presidential election, has carried out aggressive authorities and company <a href=\"https:\/\/www.wired.com\/story\/cozy-bear-dukes-russian-hackers-new-tricks\/\">espionage around the world<\/a> for years, and was behind the notorious 2021 <a href=\"https:\/\/www.wired.com\/story\/the-untold-story-of-solarwinds-the-boldest-supply-chain-hack-ever\/\">SolarWinds supply chain attack<\/a>. Whereas each HP&#8217;s and Microsoft&#8217;s breaches got here to mild inside days of one another, the scenario primarily illustrates the continued actuality of Midnight Blizzard&#8217;s worldwide espionage actions and the lengths it should go to to seek out weaknesses in organizations&#8217; digital defenses.<\/p>\n<p class=\"paywall\">\u201cWe should not be stunned that Russian intelligence-backed menace actors, and SVR particularly, are concentrating on tech corporations like Microsoft and HPE. With organizations that measurement, it could be a a lot larger shock to be taught they weren&#8217;t,\u201d says Jake Williams, a former US Nationwide Safety Company hacker and present school member on the Institute for Utilized Community Safety.<\/p>\n<p class=\"paywall\">HP Enterprise stated in a US Securities and Change Fee <a href=\"https:\/\/www.sec.gov\/ix?doc=\/Archives\/edgar\/data\/1645590\/000164559024000009\/hpe-20240119.htm\">submission<\/a> posted on Wednesday that Midnight Blizzard gained entry to its \u201ccloud-based electronic mail surroundings\u201d final 12 months. The corporate first discovered in regards to the scenario on December 12, 2023, however stated that the assault started in Might 2023. Hackers \u201caccessed and exfiltrated information \u2026 from a small proportion of HPE mailboxes belonging to people in our cybersecurity, go-to-market, enterprise segments, and different capabilities,\u201d the corporate wrote within the SEC submitting. HP Enterprise stated the breach possible took place as the results of one other incident, found in June 2023, wherein Midnight Blizzard additionally accessed and exfiltrated firm \u201cSharePoint\u201d information starting as early as Might 2023. SharePoint is a much-targeted cloud collaboration platform made by Microsoft that integrates with Microsoft 365.<\/p>\n<p class=\"paywall\">\u201cThe accessed information is proscribed to data contained within the HPE customers\u2019 electronic mail packing containers,\u201d HP Enterprise spokesperson Adam Bauer instructed WIRED in a press release. \u201cWe proceed to analyze and analyze these mailboxes to establish data that might have been accessed and can make acceptable notifications as required.\u201d<\/p>\n<p class=\"paywall\">In the meantime, Microsoft <a data-offer-url=\"https:\/\/msrc.microsoft.com\/blog\/2024\/01\/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/msrc.microsoft.com\/blog\/2024\/01\/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/&quot;}\" href=\"https:\/\/msrc.microsoft.com\/blog\/2024\/01\/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/\" rel=\"noopener\" target=\"_blank\">said<\/a> on Friday that it detected a system intrusion on January 12 tied to a November 2023 breach. The attackers focused and compromised some historic Microsoft system take a look at accounts that then allowed them to entry \u201ca really small proportion of Microsoft company electronic mail accounts, together with members of our senior management workforce and workers in our cybersecurity, authorized, and different capabilities.\u201d From there the group was capable of exfiltrate \u201csome emails and hooked up paperwork.\u201d Microsoft famous in its disclosure that the attackers seemed to be looking for details about Microsoft&#8217;s investigations and information of Midnight Blizzard itself.<\/p>\n<p class=\"paywall\">\u201cThe assault was not the results of a vulnerability in Microsoft services or products. Up to now, there isn&#8217;t any proof that the menace actor had any entry to buyer environments, manufacturing methods, supply code, or AI methods,\u201d the corporate wrote in its disclosure. \u201cThis assault does spotlight the continued danger posed to all organizations from well-resourced nation-state menace actors like Midnight Blizzard.\u201d<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/microsoft-hpe-midnight-blizzard-email-breaches\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft and Hewlett-Packard Enterprise (HPE) each lately disclosed that they suffered company electronic mail breaches by the hands of Russia&#8217;s \u201cMidnight Blizzard\u201d hackers. The group, which is tied to the Kremlin&#8217;s SVR international intelligence, is particularly linked to SVR&#8217;s APT 29 Cozy Bear, the gang that meddled in the USA 2016 presidential election, has carried [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7611,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[7230,7231,5771,7233,7206,4308,7232,3989],"class_list":["post-7609","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-bigname","tag-blizzard","tag-hacking","tag-limelight","tag-midnight","tag-push","tag-spree","tag-targets"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/7609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7609"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/7609\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/7611"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}