SolarWinds hackers breach Microsoft support agent to target customers
Nobelium engaged in password spray and brute-force attacks after implanting malware on a device belonging to a Microsoft employee
Microsoft has confirmed that some of its customers have been targeted by the Russian state-backed hacking group responsible for last year’s SolarWinds cyber attack after successfully compromising an employees' computer.
Known as Nobelium, the group was found to have engaged in “password spray and brute-force attacks” on the tech giant’s customers.
The hackers implanted “information-stealing malware” on a device belonging to a Microsoft customer support agent, through which they obtained “basic account information for a small number of [Microsoft’s] customers”, according to the firm.
They then “used this information in some cases to launch highly-targeted attacks as part of their broader campaign”.
“We responded quickly, removed the access and secured the device,” said Microsoft, adding that while the attacks were “mostly unsuccessful”, hackers managed to compromise three of its customers.
"This recent activity was mostly unsuccessful, and the majority of targets were not successfully compromised – we are aware of three compromised entities to date," the Microsoft Security Response Center team announced in a blog post. "All customers that were compromised or targeted are being contacted through our nation-state notification process.
Around 10% of the targeted customers were UK-based, with the hackers mostly focusing on “US interests”. The majority of the targets were “IT companies (57%), followed by government (20%), and smaller percentages for non-governmental organisations and think tanks, as well as financial services”.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
RELATED RESOURCE
Overall, the hackers targeted organisations from 36 countries, the tech giant stated, adding that it recommends that customers enable multi-factor authentication in order “to protect their environments from this and similar attacks”.
The news comes weeks after Nobelium launched a wave of attacks on more than 150 government agencies, think tanks, consultants, and NGOs from 24 countries, targeting an estimated 3,000 email accounts.
Microsoft's corporate VP of Customer Security & Trust, Tom Burt, said at the time said that Nobelium's main objective is to "gain access to trusted technology providers and infect their customers". The hacking group’s activities also tend to coincide with the "issues of concern to the country from which they are operating", according to the cyber security expert.
"This is yet another example of how cyber attacks have become the tool of choice for a growing number of nation-states to accomplish a wide variety of political objectives, with the focus of these attacks by Nobelium on human rights and humanitarian organisations," Burt added.
Having only graduated from City University in 2019, Sabina has already demonstrated her abilities as a keen writer and effective journalist. Currently a content writer for Drapers, Sabina spent a number of years writing for ITPro, specialising in networking and telecommunications, as well as charting the efforts of technology companies to improve their inclusion and diversity strategies, a topic close to her heart.
Sabina has also held a number of editorial roles at Harper's Bazaar, Cube Collective, and HighClouds.
-
How the UK is leading Europe at AI-driven manufacturingIn-depth A new report puts the country on top of the charts in adopting machine learning on the factory floor in several critical measures
-
US data center power demand forecast to hit 106GW by 2035, report warnsNews BloombergNEF research reveals a sharp 36% jump in energy forecasts as "hyperscale" projects reshape the American grid
-
Foreign states ramp up cyberattacks on EU with AI-driven phishing and DDoS campaignsNews ENISA warns of hacktivism, especially through DDoS attacks
-
A new 'top-tier' Chinese espionage group is stealing sensitive datanews Phantom Taurus has been operating for two years and uses custom-built malware to maintain long-term access to critical targets
-
‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategyNews Paul Chichester, director of operations at the UK’s National Cyber Security Centre, urged businesses to keep closer tabs on geopolitical events to gauge potential cyber threats.
-
Three ways to evolve your security operationsWhitepaper Why current approaches aren’t working
-
Beat cyber criminals at their own gameWhitepaper A guide to winning the vulnerability race and protection your organization
-
Quantifying the public vulnerability market: 2022 editionWhitepaper An analysis of vulnerability disclosures, impact severity, and product analysis
-
Same cyberthreat, different storyWhitepaper How security, risk, and technology asset management teams collaborate to easily manage vulnerabilities
-
Business value of ServiceNow security operationsWhitepaper Experience transformational gains from automating workflows and data-sharing among IT, security, and risk teams to rapidly remediate threats
