"Learning from Microsoft's Russian Hacking Incident: New Guidance and Mistakes to Avoid"

Microsoft confirmed that Kremlin-backed spies gained access to its network and stole internal emails and files after exploiting a legacy, non-production test tenant account that did not have multi-factor authentication (MFA) enabled. The attackers used password spray attacks and compromised a test OAuth application to access corporate inboxes belonging to top Microsoft executives and staff. Microsoft has acknowledged the need for faster implementation of MFA and has provided guides for administrators to prevent similar breaches. The incident has raised concerns about the insufficient MFA protection within the company and highlighted the importance of basic security hygiene.
- Microsoft sheds some light on Russian email heist – and how to learn from Redmond's mistakes The Register
- Microsoft explains how Russian hackers spied on its executives The Verge
- Microsoft, HPE hacks by Russia are just the tip of the iceberg The Washington Post
- Microsoft Shares New Guidance in the Wake of 'Midnight Blizzard' Cyberattack DARKReading
- In major gaffe, hacked Microsoft test account was assigned admin privileges Ars Technica
Reading Insights
0
1
3 min
vs 4 min read
86%
699 → 96 words
Want the full story? Read the original article
Read on The Register