Russian Hackers Steal U.S. Government Emails in Ongoing Cyberattack, Microsoft Discloses
ICARO Media Group
In a disturbing revelation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed that Russian government-backed hackers have successfully stolen emails from multiple U.S. federal agencies. This breach was a result of an ongoing cyberattack at Microsoft, which the tech giant disclosed in January.
According to CISA, the cyberattack allowed the hackers, known as "Midnight Blizzard" or APT29, to compromise Microsoft corporate email accounts and gain access to federal government emails. The agency deems this breach as a grave and unacceptable risk to the agencies involved.
In response to the escalating intrusions by the Russian hackers, CISA issued an emergency directive on April 2, ordering civilian government agencies to take immediate action to secure their email accounts. The directive was prompted by new information suggesting that the hackers were intensifying their efforts.
Affected federal agencies were given a week to reset passwords and secure their compromised systems. However, CISA did not disclose the specific agencies that fell victim to the attacks. Microsoft has not provided further details on the progress of remediating the attack since March.
The severity of this breach is underscored by the fact that the U.S. government heavily relies on Microsoft for hosting government email accounts. The Russian hackers initially targeted Microsoft's corporate email systems, including accounts belonging to senior leadership and employees in cybersecurity, legal, and other areas. Subsequently, they expanded their scope and targeted other organizations outside of Microsoft, resulting in stolen emails from U.S. government agencies.
This cyberattack carries implications beyond just government security. Microsoft has faced increasing scrutiny over its security practices following multiple intrusions by hackers affiliated with adversarial countries. Earlier this year, the U.S. Cyber Safety Review Board attributed a 2023 breach of U.S. government emails, carried out by China government-backed hackers, to a series of security failures at Microsoft.
The breach attributed to China's hackers allowed them to obtain a sensitive email key, granting them broad access to both consumer and government emails. Furthermore, in a separate incident, the U.S. Department of Defense recently notified 20,000 individuals that their personal information was exposed due to a Microsoft-hosted cloud email server being left without a password for several weeks in 2023.
As cyber threats become increasingly sophisticated, it is clear that robust security measures need to be in place to safeguard critical government systems and personal data. The ongoing cyberattack and subsequent theft of U.S. government emails serve as a stark reminder of the evolving threat landscape and the urgent need for continued vigilance in protecting digital infrastructure.