Chinese hackers steal Azure AD signing keys 

B2B Cyber ​​Security ShortNews

Share post

Microsoft launched an investigation into unauthorized access to the Exchange Online email services of several US government agencies. The experts found that the hack was successful with the help of vulnerabilities, stolen keys and an Azure AD signing key. But where the hackers got the keys from is probably still a mystery. 

Two dozen organizations, including US government agencies, were recently hacked. Chinese hackers stole a consumer signing key for an inactive Microsoft account (MSA). The incident was reported by US government officials after several government agencies discovered unauthorized access to Exchange Online email services.

Action by Chinese professional hackers

Microsoft began investigating the attacks back on June 16 and found that a Chinese cyber-espionage group it knows as Storm-0558 was stealing the email accounts of about 25 organizations (reportedly including the US State Department and the US -Department of Commerce) hacked. The attackers used the stolen Azure AD corporate signing key to forge new authentication tokens by exploiting a GetAccessTokenForResource API vulnerability, giving them access to the targets' corporate email. "The method by which the actor obtained the key is the subject of ongoing investigation," Microsoft admitted in a new advisory released today.

Storm-0558 can use PowerShell and Python scripts to generate new access tokens for the OWA Exchange Store service via REST API calls to steal emails and attachments. However, Microsoft has not confirmed whether this approach was used in last month's data theft attacks on Exchange Online. "Our telemetry data and research indicate that post-compromise activity was limited to email access and exfiltration for targeted users," Microsoft added today.

Suspicious keys and tokens blocked

The company blocked the use of the stolen private signing key for all affected customers on July 3, stating that the attackers' token replay infrastructure was shut down a day later. Also, on June 27, Microsoft revoked all valid MSA signing keys. "No key-related activity has been observed since Microsoft invalidated the MSA signing key purchased by the actor," Microsoft said.

Microsoft has worked through the entire course of the attack and the technical details in a security advisory.

More at Microsoft.com

 


About Microsoft Germany

Microsoft Deutschland GmbH was founded in 1983 as the German subsidiary of Microsoft Corporation (Redmond, USA). Microsoft is committed to empowering every person and company in the world to achieve more. This challenge can only be mastered together, which is why diversity and inclusion have been firmly anchored in the corporate culture from the very beginning.

As the world's leading manufacturer of productive software solutions and modern services in the age of intelligent cloud and intelligent edge, as well as a developer of innovative hardware, Microsoft sees itself as a partner to its customers to help them benefit from the digital transformation. Security and data protection have top priority when developing solutions. As the world's largest contributor, Microsoft is driving open source technology through its leading developer platform GitHub. With LinkedIn, the largest career network, Microsoft promotes professional networking worldwide.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more