News

Microsoft Corporate E-Mails Tapped by Russian Attackers

Some Microsoft e-mails were exfiltrated by "Midnight Blizzard," a Russia-sponsored attack group, Microsoft announced on Friday.

The attacks, which breached some of Microsoft's corporate e-mail accounts, possibly over a month's period of time, were found to have started in "late November 2023." Microsoft only detected the issue "on January 12, 2024." 

The attackers were looking for Microsoft's knowledge about themselves, apparently, per Microsoft's investigation.

The investigation indicates they [the attackers] were initially targeting email accounts for information related to Midnight Blizzard itself. We are in the process of notifying employees whose email was accessed.

Some senior leadership Microsoft corporate e-mails were accessed, along with any attachments. Microsoft doesn't think that its customer accounts were affected by the attack. It is disclosing information about it as part of its Secure Future Initiative pledge of transparency.

In password spray attacks, commonly used passwords are tried across a network to gain access. In this case, the threat actors managed to gain password access on old nonproduction Microsoft test accounts. From that foothold, the attackers were able to gain permissions and "access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions," the announcement indicated.

In reaction to the breach, Microsoft pledged to "act immediately to apply our current security standards to Microsoft-owned legacy systems and internal business processes, even when these changes might cause disruption to existing business processes."

Microsoft is continuing its investigation and declared that it plans to "take additional actions based on the outcomes of this investigation and will continue working with law enforcement and appropriate regulators."

The Midnight Blizzard attack group used to be called "Nobelium" by Microsoft back in 2021 when they had conducted widespread espionage on U.S. government agencies, compromising Exchange Online e-mails through various methods. Microsoft switched to a bad weather naming convention for attack groups last year.

About the Author

Kurt Mackie is senior news producer for 1105 Media's Converge360 group.

Featured

  • Microsoft Dismantles RedVDS Cybercrime Marketplace Linked to $40M in Phishing Fraud

    In a coordinated action spanning the United States and the United Kingdom, Microsoft’s Digital Crimes Unit (DCU) and international law enforcement collaborators have taken down RedVDS, a subscription based cybercrime platform tied to an estimated $40 million in fraud losses in the U.S. since March 2025.

  • Sound Wave Illustration

    CrowdStrike's Acquisition of SGNL Aims to Strengthen Identity Security

    CrowdStrike signs definitive agreement to purchase SGNL, an identity security specialist, in a deal valued at about $740 million.

  • Microsoft Acquires Osmos, Automating Data Engineering inside Fabric

    In a strategic move to reduce time-consuming manual data preparation, Microsoft has acquired Seattle-based startup Osmos, specializing in agentic AI for data engineering.

  • Linux Foundation Unites Major Tech Firms to Launch Agentic AI Foundation

    The Linux Foundation today announced the creation of a new collaborative initiative — the Agentic AI Foundation (AAIF) — bringing together major AI and cloud players such as Microsoft, OpenAI, Anthropic and other major tech companies.