Close Menu
Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Subscribe
    • Home
    • Top News
    • World
    • Economy
    • Science
    • Tech
    • Sport
    • Entertainment
    • Contact Form
    Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Home»Tech»Default password missing from MFA: This is how the attack on MS security partition happened
    Tech

    Default password missing from MFA: This is how the attack on MS security partition happened

    Theodore MeeksBy Theodore MeeksJanuary 26, 2024No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email
    Default password missing from MFA: This is how the attack on MS security partition happened
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    How did the attackers get into Microsoft's cybersecurity department? Because of the lack of multi-factor authentication and the use of a standard password, as Microsoft itself must now admit.

    advertisement

    Background: A few days ago, Microsoft announced that the Russian-backed Midnight Blizzard group had successfully accessed emails from security employees. The criminals, also known as Nobelium, have been targeting Microsoft since the end of November 2023 and have managed to steal data from executives during this time. Their primary goal: to steal information about their group stored at Microsoft.

    This is not how you do it

    But how could this happen in the cybersecurity department of all places? Microsoft has now published details of the approach that will encourage other organizations to improve their security infrastructure. Midnight Blizzard was already known to use password spraying. Attackers use a limited number of passwords, but these are the most common or most likely to be used. In other words: you can start with a standard password.

    By restraining themselves and hiding behind a proxy infrastructure, criminals were able to avoid early detection. However, this should usually not be enough, as Microsoft itself encourages the standard use of multi-factor authentication. The password in Nobelium's hands should not be enough. However, the company itself is now describing how this simply did not activate in the old test renter's account. Through this, Midnight Blizzard gained initial access.

    Thanks to the legacy OAuth testing application, the attackers were then able to provide themselves with higher access rights and set up their own OAuth applications and their own access. By providing them with the appropriate Exchange Online rights, they can use them to access emails from other mailboxes.

    There were no weaknesses, nor were they necessary

    Once the attack became known, Microsoft confirmed that Midnight Blizzard did not exploit any vulnerabilities. Instead, the testing system was hacked. However, it is not yet known what security measures Microsoft itself has not implemented. It remains unclear whether Microsoft discovered the attack by the same group on HPE, which became known shortly afterwards, with the company only stating that it notified other affected parties.

    To help other organizations protect themselves from the same approach, Microsoft recommends that: They must be able to recognize malicious OAuth applications and defend against password spraying attacks. Details of the individual steps can be found in Microsoft's blog post. Microsoft also describes how administrators can detect such attacks.


    (fu)

    To the home page

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Theodore Meeks

    Lifelong foodaholic. Professional twitter expert. Organizer. Award-winning internet geek. Coffee advocate.

    Related Posts

    Neodymium Magnet Uses and Safety Tips for 2025

    October 4, 2025

    Halifax Stanfield Airport Pilots Passenger Service Robots in Bid to Boost Traveler Experience

    August 25, 2025

    Battery miracle in test – HP Omnibook X AI: If it takes longer again

    August 29, 2024
    Navigate
    • Home
    • Top News
    • World
    • Economy
    • Science
    • Tech
    • Sport
    • Entertainment
    • Contact Form
    Pages
    • About Us
    • DMCA
    • Contact Form
    • Privacy Policy
    • Editorial Policy
    STAY UPTODATE

    Get the Latest News With Aviationanalysis.net

    OFFICE

    X. Herald Inc.
    114 5th Ave New York,
    NY 10011, United States

    QUERIES?

    Do you have any queries? Feel free to contact us via ourĀ Contact Form

    Visit Our Office

    X. Herald Inc.
    114 5th Ave New York,
    NY 10011, United States

    • About Us
    • DMCA
    • Contact Form
    • Privacy Policy
    • Editorial Policy
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.