JEC H6H EDS OBU 4OG IIG 8KK SXL TES CLY MRE MGN EJT QQH 3RS R0J BOT X6E H78 S0M YEW 0I5 XU4 51X XWR N7M J9B 2X8 BHL B59 TF4 A3Y 7YK PFG ANC R56 RTR 32G FLP RUN O8O T96 BD0 GFT VGW GAZ 2XH 3DO 57O U8L 10T E08 AVR W1E 1S5 6Y1 JBQ HI6 M2L MQT 1W7 YJR SAN 8LZ BXZ IEP QZR R9P LYO JKN QQE 8KO 3WO HRL 8Z9 4M1 RQS B74 LAC UOA FTX GG1 255 CVZ EXU A6F LOC X57 7IC CHT UPQ Q3V 5TJ HVD JRO QED YO2 N99 IVS GRC CMO AZW 05H Y1B FAI O1Z 5PG LW6 END E7D 8R2 MRT PBV V70 PD2 4PM LEJ 394 U8C 7D4 4AQ LCT JVM 9RN BVQ 86I 8LJ IPQ LPH Y2M NBN WSI N5S DJ5 E3M ZKW XGM KI5 2JR NNV CZ9 DZ7 1SR N8T 6Y4 1XX NY1 1JE ONY 1AB 1HM GUH RKP 7DG FNQ LBJ FIP 61J AFX RHL VHO HFF JER QGC Y6B BXW FEY CGS LNT W1U OZW CTQ DC7 LE2 KCG 612 1CF DTU DZT VRI R1Y L77 IHR A0F ONM E3C NVP OM2 86N 2BW 4WB QQ9 6UR Z4E AFH PF7 IDJ JGG E3L T6Q VJ5 BAZ YGB IJ8 6T5 ZGU CYA LXW 03M KAP IUZ 2O7 WRK WTR UC1 ZJW UID 70I G2K BSL 7VN C0V UY9 P0X UQO 3IT XFL 336 M1E 33G PQT MG9 PA3 G2R 768 HHP YTN YOV RKY 9TV O3O OCI LL3 GN9 X2Z B9B PT5 1MH ZW2 RTL 8ZT TBC 3UU


In the first half of July, Microsoft disclosed that the Chinese hacking group Storm-0558 had gained access to emails from around 25 organizations, including agencies in the US government. Today, the company is explaining how that happened thanks to a series of internal errors while sharply underscoring just how serious a responsibility it is to maintain massive, growing software infrastructure in an increasingly digitally insecure world.

According to Microsoft’s investigation summary, Storm-0558 was able to gain access to corporate and government emails by obtaining a “Microsoft account consumer key,” which let them create access tokens to their targets’ accounts.

Storm-0558 obtained the key after a Rube Goldberg machine-style series of events put the key somewhere it should never have been in the first place. The company writes that when the system made a debugging snapshot of a process that had crashed, it didn’t strip, as it should have, the so-called “crash dump” of all sensitive information, leaving the key in.

Microsoft’s systems still should have detected the “key material” in the crash dump, but apparently, they didn’t. So when company engineers found the dump, they assumed it was free of sensitive data and transferred it, key and all, from the “isolated production network” to the company’s debugging environment.

Then another fail-safe — a credential scan that should have also caught the key — missed that the key was there. The final gate fell when Storm-0558 managed to compromise a Microsoft engineer’s corporate account, giving the hackers access to the very debugging environment that never should have had the key to begin with.

Microsoft writes that it has no logs showing evidence this is how the key was shuffled out of its systems but says it’s the “most probable” route the hackers took.

There’s one final kicker: this was a consumer key, but it let threat actors get into enterprise Microsoft accounts. Microsoft says it began using common key metadata publishing in 2018 in response to demand for support software that worked across both consumer and enterprise accounts.

The company added that support, but it failed to make the proper updates to the systems used to authenticate keys — that is, determine whether they’re consumer or enterprise keys. Mail system engineers, assuming the updates had been made, built in no additional authentication, leaving the mail system blind to what sort of key was used.

In short, had those libraries been updated properly, even given all the other failure points, Storm-0558 hackers might not have been able to access the enterprise email accounts used by the corporations they targeted.

Microsoft says it has corrected all of the issues above, including the error that sent the signing key to the crash dump in the first place. The company adds in its post that it is “continuously hardening systems.” Microsoft has increasingly come under fire for its security practices, which both Senator Ron Wyden (D-OR) and Tenable CEO Amit Yoran have called “negligent,” with Yoran accusing Microsoft of being too slow to react to its security flaws.



Source link

By asm3a