CIO TechWorld
Banner Image
Banner Image
  • Home
  • Technology
    • AI/ML
    • API
    • AR/VR
    • Big Data
    • Blockchain
    • Cybersecurity
    • Cloud
    • DevOps
    • IoT
  • Vertical
    • Aviation
    • Construction
    • Education
    • Energy
    • Healthcare
    • Legal
    • Logistics
    • Manufacturing
  • Enterprise Software
    • Asset Management
    • CRM
    • Enterprise Content Management
    • Enterprise Storage
    • ERP
    • HRM
  • Process
    • Procurement
    • Supply Chain
  • Magazines
  • CXO Ladder
  • Authors
  • Events
  • About Us
  • Newsletter
  • Contact Us
No Result
View All Result
CIO TechWorld
No Result
View All Result

Hackers Stole Microsoft’s Digital Key to Compromise Emails of US Govt Agencies

The hackers managed to gain access to one of Microsoft's digital keys, exploiting a flaw in the company's code to steal emails from various entities, including U.S. government agencies.

by admin
0 0
Hackers Stole Microsoft’s Digital Key to Compromise Emails of US Govt Agencies

Hackers Stole Microsoft's Digital Key to Compromise Emails of US Govt Agencies. ciotechworld

Share on XShare on Linkedin

In a recent blog post, Microsoft revealed a concerning security breach orchestrated by Chinese hackers. The hackers managed to gain access to one of Microsoft’s digital keys, exploiting a flaw in the company’s code to steal emails from various entities, including U.S. government agencies. The attack was carried out by using the stolen signing key to forge authentication tokens, allowing the hackers to access inboxes as if they were legitimate users.

According to Microsoft and U.S. officials, this covert operation by Chinese state-linked hackers had been ongoing since May, affecting around 25 organizations, including at least two government agencies: the State and Commerce Departments. Microsoft attributed the month-long cyberactivity to a newly identified espionage group named Storm-0558, with strong ties to China.

As the investigation continues, Microsoft remains puzzled as to how the hackers acquired their signing key, which was misused to forge authentication tokens for unauthorized inbox access. Targets of the attack include prominent figures like U.S. Commerce Secretary Gina Raimondo, U.S. State Department officials, and other undisclosed organizations.

In its blog post, Microsoft clarified that the hackers obtained a consumer signing key, known as an MSA key, originally used to secure consumer email accounts like Outlook.com. However, the hackers ingeniously used this key to forge tokens for breaking into enterprise inboxes, taking advantage of a “validation error in Microsoft code.”

Although Microsoft claims to have blocked all malicious activity related to this breach, the method through which the hackers obtained their hands on the company’s signing key remains unclear. The tech giant has now fortified its key issuance systems to prevent a recurrence of this kind of security breach.

One fortunate mistake made by the hackers was their use of the same key for multiple inbox raids. This allowed investigators to trace and identify all unauthorized access requests across both Microsoft’s enterprise and consumer systems, enabling them to notify those affected and gain a better understanding of the extent of the breach.

The Top 5 Questions Keeping CIOs Awake at Night
Technology

The Top 5 Questions Keeping CIOs Awake at Night

Exploring Modern Trends in Workplace Technology
HRM

Exploring Modern Trends in Workplace Technology

Can You Build a Data Center in Your Home?
Cloud

Can You Build a Data Center in Your Home?

Why Industrial Machinery Is a Target for Cyber Attacks
Cybersecurity

Why Industrial Machinery Is a Target for Cyber Attacks

Prev Next
CIO TechWorld

Copyright © 2025 CTW

Quick Links

  • Home
  • Technology
  • Vertical
  • Enterprise Software
  • Process
  • Magazines
  • CXO Ladder
  • Authors
  • Events
  • About Us
  • Newsletter
  • Contact Us

Please follow us

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • Technology
    • AI/ML
    • API
    • AR/VR
    • Big Data
    • Blockchain
    • Cybersecurity
    • Cloud
    • DevOps
    • IoT
  • Vertical
    • Aviation
    • Construction
    • Education
    • Energy
    • Healthcare
    • Legal
    • Logistics
    • Manufacturing
  • Enterprise Software
    • Asset Management
    • CRM
    • Enterprise Content Management
    • Enterprise Storage
    • ERP
    • HRM
  • Process
    • Procurement
    • Supply Chain
  • Magazines
  • CXO Ladder
  • Authors
  • Events
  • About Us
  • Newsletter
  • Contact Us

Copyright © 2025 CTW