Satya Nadella, CHIEF EXECUTIVE OFFICER of Microsoft.
CNBC
Microsoft revealed in a recent regulatory report that a Russian intelligence group successfully accessed the email accounts of several high-ranking executives within the company. This group, known as Nobelium, previously executed the significant breach of the government contractor SolarWinds in 2020, has resurfaced to execute this latest operation, which Microsoft recently uncovered.
This incident is not the first instance of Russian hackers infiltrating Microsoft’s networks. State-sponsored cyberattacks pose a heightened risk, particularly in periods of geopolitical tension, and the ongoing conflict between Russia and Ukraine has been escalating for nearly two years. Recent developments reported that Ukrainian forces conducted drone strikes in various locations within Russia, further intensifying these risks.
Following this breach, Microsoft’s announcement aligns with the new U.S. regulations requiring the reporting of cybersecurity incidents. A Microsoft representative emphasized that while the company does not believe the breach had a significant impact, it remains committed to adhering to the spirit of these new regulations to maintain transparency.
The Cybersecurity and Infrastructure Security Agency (CISA) is actively collaborating with Microsoft to gain insights into this incident and assess its potential implications to better protect other vulnerable entities. Eric Goldstein, CISA’s executive assistant director for cybersecurity, stated, “As indicated in Microsoft’s announcement, we currently have no evidence of impacts on Microsoft’s customer environments or products.” This underscores the agency’s proactive approach to cybersecurity.
In late November, the group accessed “a legacy non-production test tenant account,” according to the Microsoft Security Response Center. After breaching this account, the hackers exploited its permissions to infiltrate a small number of corporate email accounts belonging to Microsoft executives and employees across various departments, including cybersecurity and legal, leading to the exfiltration of specific emails and attached documents.
The company’s senior leadership team, featuring Chief Financial Officer Amy Hood and President Brad Smith, collaborates closely with CEO Satya Nadella to address such cybersecurity challenges and ensure the organization’s resilience against future threats.
Microsoft has confirmed that there is no evidence to suggest that Nobelium accessed customer data, production systems, or proprietary source code during this incident. This statement aims to reassure users and stakeholders about the integrity of Microsoft’s data protection measures.
<pThe U.S. government and Microsoft have classified Nobelium as a component of the Russian foreign intelligence service SVR. This hacking group is infamous for orchestrating one of the most significant breaches in U.S. history by embedding malicious code into updates for SolarWinds’ Orion software, which was utilized by several U.S. government agencies, including Microsoft itself.
Known by various names, including APT29 and Cozy Bear, Nobelium is recognized as an advanced persistent threat group that has targeted the systems of U.S. allies and the Department of Defense. Microsoft also refers to Nobelium as Midnight Blizzard in its internal communications.
Nobelium was previously linked to another Russian hacking group involved in the high-profile breach of the Democratic National Committee’s systems in 2016, showcasing its long-standing cyber espionage activities.
In the previous year, a vulnerability within Microsoft’s software allowed state-aligned hackers from China to access the email accounts of high-ranking government officials, including Commerce Secretary Gina Raimondo, right before a crucial U.S.-China summit. Senator Ron Wyden, a Democrat from Oregon, criticized Microsoft’s “negligent cybersecurity practices,” highlighting the need for improved security measures to prevent such breaches.
Microsoft stated, “We are continuing our investigation and will take further actions based on its findings, while also collaborating with law enforcement and relevant regulatory bodies.” This commitment emphasizes the importance of accountability and proactive measures in cybersecurity.
The Federal Bureau of Investigation is aware of this breach and is currently working with federal partners to provide assistance and address the situation effectively.
Don’t miss out on these stories from CNBC PRO: