cxo voice
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

Microsoft reveals how China-based hackers stole its consumer email key

IANS by IANS
September 9, 2023
Cybersecurity resilience top priority for Indian businesses: Cisco

hackers stole a digital consumer key from Microsoft to gain unfettered access to US government emails and the tech giant has detailed how the cyber criminals pulled off one of the biggest heists in the corporate and government circles.

China-based threat actor, Storm-0558, used an acquired Microsoft account (MSA) consumer key to forge tokens to access OWA (Outlook Web App) and Outlook.com.

“Our investigation found that a consumer signing system crash in April of 2021 resulted in a snapshot of the crashed process (crash dump). The crash dumps, which redact sensitive information, should not include the signing key,” the company said after a technical investigation.

In this case, a race condition allowed the key to be present in the crash dump (this issue has been corrected).

“The key material’s presence in the crash dump was not detected by our systems (this issue has been corrected),” said Microsoft.

The hackers used that digital skeleton key to break into both the personal and enterprise email accounts of government officials hosted by Microsoft.

ADVERTISEMENT

“We found that this crash dump, believed at the time not to contain key material, was subsequently moved from the isolated production network into our debugging environment on the internet connected corporate network,” explained the company.

After April 2021, when the key was leaked to the corporate environment in the crash dump, the Storm-0558 actor was able to successfully compromise a Microsoft engineer’s corporate account.

This account had access to the debugging environment containing the crash dump which incorrectly contained the key.

“Due to log retention policies, we don’t have logs with specific evidence of this exfiltration by this actor, but this was the most probable mechanism by which the actor acquired the key,” Microsoft added.

IANS

IANS

For any query, [email protected]

Related Posts

Check Point Lakera
Cyber Security

Check Point Software Acquires Lakera to Enhance AI Security Solutions

September 17, 2025
Wipro CyberShield
Cyber Security

Wipro and CrowdStrike Unveil AI-Powered CyberShield MDR to Enhance Enterprise Security

September 15, 2025
Quick Heal BHASHINI
Cyber Security

Quick Heal Technologies Partners with BHASHINI to Enhance Cybersecurity Education in Regional Languages

September 11, 2025
Ransomware in Education
Cyber Security

Ransomware in Education: Progress Made, But Challenges Remain for IT Teams

September 11, 2025
Exabeam
Cyber Security

Exabeam Enhances Security Operations with Google Cloud Integration to Combat Insider Threats from AI Agents

September 10, 2025
cybersecurity
Cyber Security

Cybersecurity & IT in 2025: AI Arms Race, Passwordless Future, and a $1 Billion Security Push

August 13, 2025
Quick Heal Tamil Nadu
Cyber Security

Quick Heal Launches Internet Security Essentials in Tamil Nadu to Enhance Online Safety with AI-Powered Protection

August 7, 2025
Rubrik and Sophos Join Forces to Enhance Microsoft 365 Protection with New Backup and Recovery Service
Cyber Security

Rubrik and Sophos Join Forces to Enhance Microsoft 365 Protection with New Backup and Recovery Service

August 6, 2025
Load More
ADVERTISEMENT

Latest Updates

MediaTek TSMC

MediaTek and TSMC Partner to Pave the Way for Next-Generation Chip Performance with N2P Process

by Deepa Sharma
7 hours ago

ABB investment

ABB Announces $110 Million Investment in U.S. Expansion

by Deepa Sharma
8 hours ago

Check Point Lakera

Check Point Software Acquires Lakera to Enhance AI Security Solutions

by Arshi Khan
11 hours ago

Phil Mottram HPE

Phil Mottram to Drive HPE’s Global Sales as New Chief Sales Officer

by Deepa Sharma
11 hours ago

Google UK

Google Invests £5 Billion in UK: New Data Center to Boost Jobs and Economy

by Deepa Sharma
1 day ago

NextEra and ServiceNow Forge Partnership to Drive Digital Transformation in Saudi Arabia and MENA

NextEra and ServiceNow Forge Partnership to Drive Digital Transformation in Saudi Arabia and MENA

by Arshi Khan
2 days ago

Expert Views

Why Even One Unpatched Device Can Be a Catastrophic Risk for Startups and SMBs
Cyber Security

Why Even One Unpatched Device Can Be a Catastrophic Risk for Startups and SMBs

July 25, 2025
Cyber Criminals
Cyber Security

How WormGPT Became ChatGPT’s Evil Twin

July 15, 2025
When AI Empowers Both Networks and Hackers: The New Battlefield for India’s Telecoms
Opinion

When AI Empowers Both Networks and Hackers: The New Battlefield for India’s Telecoms

May 20, 2025
Molly Sands AI
AI

AI RIP: 5 Things Knowledge Workers Will Say ‘Sayonara’ to in the Next Decade

March 8, 2025
multi cloud
Cloud

Multi-Cloud Made Simple: Strategies for Smart Business Management

March 5, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

Tokenization
Interview

Revolutionizing Finance: An Exclusive Interview with Sid Ugrankar, Co-founder of Qila.io on the Future of Blockchain and Tokenization

-
Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-
Interview on Counterfeit products with Nikhil Narayan
Leaders Talk

Advancements in ML & AI made it possible to detect counterfeit products in real-time, says Nikhil Narayan

-
Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami
Leaders Talk

Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release

Copyright © 2025 CXOVoice - All Right Reserved