Wednesday, April 16, 2025
HomeCyber Security NewsChinese Hack of Microsoft Consumer Key Stemmed From its Engineer’s Corporate Account

Chinese Hack of Microsoft Consumer Key Stemmed From its Engineer’s Corporate Account

Published on

SIEM as a Service

Follow Us on Google News

Storm-0558, a threat actor based in China, has recently gained access to a Microsoft account consumer key. This has allowed them to infiltrate and compromise 25 organizations, including those within government agencies.

Since May 15, 2023, they have been using fake tokens to access emails for espionage.

On July 11, 2023, Microsoft implemented a block on the campaign of Storm-0558 while ensuring that other environments were not affected.

- Advertisement - Google News

U.S. Commerce Secretary Gina Raimondo and other high-profile individuals may have had their private emails accessed by hackers.

Investigation from Microsoft

After categorizing the threat actor group, Microsoft initiated an inquiry into the methods employed by the threat actors to obtain the Microsoft account consumer signing key and how it was utilized to gain entry into enterprise email systems.

In their investigation, the company determined a consumer signing system crash in April of 2021, which led to the creation of a snapshot of the crashed process.

At the time of occurrence, it was not within Microsoft’s knowledge that the crash dump contained the aforementioned key material.

Then, the crash dump was found to be moved to the debugging environment on the internet-connected corporate network, believing the key was not included.

Microsoft believes the key was leaked from the crash dump in the corporate environment by successfully compromising a Microsoft engineer’s corporate account.

“Due to log retention policies, we don’t have logs with specific evidence of this exfiltration by this actor, but this was the most probable mechanism by which the actor acquired the key.”

Microsoft has reported that the problems mentioned above have been resolved, and an improved credential scanning technology has been implemented to identify the signing key’s existence more accurately.

The Chinese Embassy, situated in Washington, D.C., did not respond to an email sent. The government of China has dismissed the accusation of stealing emails belonging to high-ranking officials in the United States as “unfounded.”

Organizations must take proactive measures to ensure the security of their accounts and data, especially in light of such threats.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

MITRE Ends CVE Program Support – Leaked Internal Memo Confirms Departure

A leaked internal memo dated April 15, 2025, has sent shockwaves through the cybersecurity...

Protecting Against Insider Threats – Strategies for CISOs

Insider threats represent a critical vulnerability in organizational cybersecurity, posing risks that are often...

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility

Zeek, formerly known as Bro, has established itself as a leading open-source network security...

Critical Chrome Vulnerability Exposes Users to Data Theft and Unauthorized Access

A critical security vulnerability has been discovered in Google Chrome, prompting an urgent update...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

MITRE Ends CVE Program Support – Leaked Internal Memo Confirms Departure

A leaked internal memo dated April 15, 2025, has sent shockwaves through the cybersecurity...

Protecting Against Insider Threats – Strategies for CISOs

Insider threats represent a critical vulnerability in organizational cybersecurity, posing risks that are often...

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility

Zeek, formerly known as Bro, has established itself as a leading open-source network security...