Article Details

Scrape Timestamp (UTC): 2024-04-12 04:39:32.131

Source: https://thehackernews.com/2024/04/us-federal-agencies-ordered-to-hunt-for.html

Original Article Text

Click to Toggle View

U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday issued an emergency directive (ED 24-02) urging federal agencies to hunt for signs of compromise and enact preventive measures following the recent compromise of Microsoft's systems that led to the theft of email correspondence with the company. The attack, which came to light earlier this year, has been attributed to a Russian nation-state group tracked as Midnight Blizzard (aka APT29 or Cozy Bear). Last month, Microsoft revealed that the adversary managed to access some of its source code repositories but noted that there is no evidence of a breach of customer-facing systems. The emergency directive, which was originally issued privately to federal agencies on April 2, was first reported on by CyberScoop two days later. "The threat actor is using information initially exfiltrated from the corporate email systems, including authentication details shared between Microsoft customers and Microsoft by email, to gain, or attempt to gain, additional access to Microsoft customer systems," CISA said. The agency said the theft of email correspondence between government entities and Microsoft poses severe risks, urging concerned parties to analyze the content of exfiltrated emails, reset compromised credentials, and take additional steps to ensure authentication tools for privileged Microsoft Azure accounts are secure. It's currently not clear how many federal agencies have had their email exchanges exfiltrated in the wake of the incident, although CISA said all of them have been notified. The agency is also urging affected entities to perform a cybersecurity impact analysis by April 30, 2024, and provide a status update by May 1, 2024, 11:59 p.m. Other organizations that are impacted by the breach are advised to contact their respective Microsoft account team for any additional questions or follow up. "Regardless of direct impact, all organizations are strongly encouraged to apply stringent security measures, including strong passwords, multi-factor authentication (MFA) and prohibited sharing of unprotected sensitive information via unsecure channels," CISA said. The development comes as CISA released a new version of its malware analysis system, called Malware Next-Gen, that allows organizations to submit malware samples (anonymously or otherwise) and other suspicious artifacts for analysis. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.

Daily Brief Summary

NATION STATE ACTIVITY // U.S. Agencies Directed to Investigate Russian Hack on Microsoft

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued emergency directive ED 24-02 to federal agencies due to a compromise in Microsoft systems by a Russian nation-state group, Midnight Blizzard.

Midnight Blizzard accessed Microsoft's source code repositories and extracted sensitive email correspondences, although customer systems reported no breach.

Federal agencies have been ordered to search for any sign of breaches, reset all compromised credentials, and secure authentication tools, specifically for privileged Microsoft Azure accounts.

CISA has urged all affected entities to conduct a thorough cybersecurity impact analysis by the end of April 2024 and provide a status update by May 2024.

The directive recommends implementing stringent security protocols, including strong passwords and multi-factor authentication, to guard against similar incidents.

Microsoft account teams are to assist other impacted organizations in addressing and following up on any concerns related to this breach.