Background information

Why the Microsoft hack is more problematic than originally thought

In May, a hacker group called Storm-0558 accessed e-mails as well as other data from US government agencies. This went unnoticed for a long time and the implications were underestimated. This was apparently due in no small part to Microsoft.

How did the hack come about?

The Cybersecurity & Infrastructure Security Agency (CISA) is also on pacifying manoeuvres for the time being. The contents of the e-mails affected were harmless. Microsoft also assumed it was an espionage attempt rather than sabotage. However, this was hardly successful.

Why didn’t anyone notice?

However, this cyber attack now brings questions and problems to light that are much more far-reaching and don’t just relate to this hack. The first question is why the extent of the hack only became evident so late – namely the week before last, a good month after hackers first gained access.

Master key stolen and copied

As it now turns out, the incident could have much further-reaching consequences than initially thought. Security company Wiz claims to have identified the Microsoft key the hackers used to snoop on e-mails. This is done using lists of valid signature keys, which are publicly available.

The stolen key wasn’t a copied token. It was actually an OpenID signing key for AAD. Think of it as a kind of master key to Microsoft’s cloud system.

Microsoft has now blocked the key, meaning hackers shouldn’t have any further access. However, we can’t rule out the idea that the hackers built a backdoor into previously compromised accounts so they no longer need this key.

My personal assessment

Header image: Shutterstock

255 people like this article


User Avatar
User Avatar

I've been tinkering with digital networks ever since I found out how to activate both telephone channels on the ISDN card for greater bandwidth. As for the analogue variety, I've been doing that since I learned to talk. Though Winterthur is my adoptive home city, my heart still bleeds red and blue. 


Computing
Follow topics and stay updated on your areas of interest

Security
Follow topics and stay updated on your areas of interest

Background information

Interesting facts about products, behind-the-scenes looks at manufacturers and deep-dives on interesting people.

Show all

These articles might also interest you

  • Background information

    Are those the new Microsoft Office logos?

    by Michelle Brändle

  • Background information

    Microsoft 365 introduces AI features and price increase

    by Martin Jud

  • Background information

    Microsoft update issue: users advised to keep PC running

    by Martin Jud