Monday, April 28, 2025
HomeCyber Security NewsChinese Hack of Microsoft Consumer Key Stemmed From its Engineer’s Corporate Account

Chinese Hack of Microsoft Consumer Key Stemmed From its Engineer’s Corporate Account

Published on

SIEM as a Service

Follow Us on Google News

Storm-0558, a threat actor based in China, has recently gained access to a Microsoft account consumer key. This has allowed them to infiltrate and compromise 25 organizations, including those within government agencies.

Since May 15, 2023, they have been using fake tokens to access emails for espionage.

On July 11, 2023, Microsoft implemented a block on the campaign of Storm-0558 while ensuring that other environments were not affected.

- Advertisement - Google News

U.S. Commerce Secretary Gina Raimondo and other high-profile individuals may have had their private emails accessed by hackers.

Investigation from Microsoft

After categorizing the threat actor group, Microsoft initiated an inquiry into the methods employed by the threat actors to obtain the Microsoft account consumer signing key and how it was utilized to gain entry into enterprise email systems.

In their investigation, the company determined a consumer signing system crash in April of 2021, which led to the creation of a snapshot of the crashed process.

At the time of occurrence, it was not within Microsoft’s knowledge that the crash dump contained the aforementioned key material.

Then, the crash dump was found to be moved to the debugging environment on the internet-connected corporate network, believing the key was not included.

Microsoft believes the key was leaked from the crash dump in the corporate environment by successfully compromising a Microsoft engineer’s corporate account.

“Due to log retention policies, we don’t have logs with specific evidence of this exfiltration by this actor, but this was the most probable mechanism by which the actor acquired the key.”

Microsoft has reported that the problems mentioned above have been resolved, and an improved credential scanning technology has been implemented to identify the signing key’s existence more accurately.

The Chinese Embassy, situated in Washington, D.C., did not respond to an email sent. The government of China has dismissed the accusation of stealing emails belonging to high-ranking officials in the United States as “unfounded.”

Organizations must take proactive measures to ensure the security of their accounts and data, especially in light of such threats.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Python-Based Discord RAT Enables Remote Control and Disruption Through a Simple Interface

A newly analyzed Python-based Remote Access Trojan (RAT) has emerged as a significant cybersecurity...

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an...

Hannibal Stealer: Cracked Variant of Sharp and TX Malware Targets Browsers, Wallets, and FTP Clients

A new cyber threat, dubbed Hannibal Stealer, has surfaced as a rebranded and cracked...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Python-Based Discord RAT Enables Remote Control and Disruption Through a Simple Interface

A newly analyzed Python-based Remote Access Trojan (RAT) has emerged as a significant cybersecurity...

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an...