Russian hackers persist in attempting to breach Microsoft’s security measures

March 9, 2024
1 min read

TLDR:

  • Microsoft warns that Russian hacking group Nobelium is trying to access internal systems and source code repositories.
  • Midnight Blizzard, as Microsoft refers to the group, has increased cyberattack tactics like password sprays.

Microsoft has revealed that the Russian hacking group Nobelium, also known as Midnight Blizzard, is attempting to infiltrate its internal systems and source code repositories. The cyberattack has intensified in recent weeks, with tactics like password sprays seeing a significant increase. While there has been no evidence of Microsoft-hosted customer-facing systems being compromised, the company is taking steps to enhance its security measures and protect its secrets shared with customers.

Midnight Blizzard has been escalating the attack, with tactics like password sprays being used at a higher volume than before. Microsoft is reaching out to affected customers and strengthening its defenses against the cyberattack. The company first detected the cyberattack from Nobelium in January, where emails from top executives were hacked. Hewlett Packard Enterprise also reported that its cloud-based email system had been compromised following the attack on Microsoft.

Nobelium, identified as part of Russia’s foreign intelligence service SVR and also known as Cozy Bear or APT29, has been linked to multiple cyberattacks against Western countries and companies. The cyber activities of Russia have been under scrutiny, with accusations of targeting politicians, journalists, and civil servants to undermine democracy. Microsoft is actively monitoring the situation and taking necessary actions to protect its systems and data from further breaches.

Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and