Saturday, January 23, 18:34
Home security Microsoft: 6 different hacker groups invade the business network

Microsoft: 6 different hacker groups invade the business network

Microsoft's first report by the Detection and Response Team (DART), which helps clients with serious cyber problems, details a case of a large client with six different hacker groups simultaneously on its network, including a state-funded hacker group that stole data and emails for 243 days.

The company announced DART in March 2019 as part of its $ 1 billion cost-push business announced by the CEO Satya Nadella the 2017.

Without disclosing customer names, Microsoft intends to publish regular updates on DART activities to show how hackers work.

The first report details one APT intruder who stole admin credentials to infiltrate the target's network and steal sensitive data and emails.

In particular, the client did not use Multi-Factor Authentication (MFA), which could have prevented the breach. Microsoft revealed last week that 99,9% of compromised accounts did not use MFA and only 11% of businesses use MFA.

DART was introduced after the customer failed to fly an attacker APT out of network after 243 days, despite hiring an incident response vendor seven months earlier. The hacker was removed from the system the day the Microsoft team arrived. It also discovered that five other threat groups were in the network.

In this case, the main attacker used one password-spraying attack to "grab" the admin credentials of the client Office 365 and from there he was looking for mailboxes to find more credentials shared with employees by email. DART found that the attacker was seeking intellectual property licenses in some markets.

The attacker even used the client's e-discovery tools to automate the search of the relevant emails.

According to Microsoft, the company in the first month of the attack tried to handle its own account Office 365, and then brought in an incident response company to lead to what turned out to be a long investigation.

Microsoft Office updates: Fix issues in Word and Skype

"This investigation lasted more than seven months and revealed a possible compromise of sensitive information stored in Office 365 mailboxes. 243 days after the initial invasion, DART took over with the management company it had hired," says Microsoft.

"DART quickly identified targeted mailboxes searches and compromised accounts, as well as intrusion command and control channels. DART also identified five additional invaders campaigns who insist they had nothing to do with the original incident. even earlier to create access channels (eg rear doors) for later use as required. ”

Microsoft outlines five key steps organizations can use to minimize their exposure to APT attackers, including enabling them MFA, its removal authentication legacy, proper first responders training, proper incident logging with a security, information and event management product and recognition that intruders use legitimate administrative and security tools to identify targets.

The blog offers the same message it gave customers who have been the victims of major ransomware groups last week: customers need to activate the available security tools and focus on recording security incidents.

Microsoft covered the work of ransomware operators REvil, Samas or SamSam, Doppelpaymer, Bitpaymer and Ryuk. It details how attackers deactivate security software and note that some clients even deactivate security software to improve security. performance, allowing cybercriminals to roam the networks for months without authorization.


Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehc
Be the limited edition.


Instagram: How to enable notifications for specific profiles

There are some profiles on Instagram where you want to see the content they publish as soon as possible - it can be a news ...

NASA's historic launch pad is to be demolished

NASA's famous Mobile Launcher Platform-2 launch platform, which has been linked to the Apollo and Space Shuttle missions, ...

Elon Musk: Gives $ 100 million for best CO2 capture technology Ο Elon Musk δήλωσε χθες, στο λογαριασμό του στο Twitter, ότι σκοπεύει να δώσει 100 εκατομμύρια...

How can you unblock sites and services using a VPN?

The Internet is free and open to all. However, there are some sites and services whose content is blocked, which ...

Google Chrome: How to manage your extensions?

Google Chrome extensions can be very useful, as they improve your productivity when using the browser.

Intel CPUs Review: Core i7-10700 vs Core i7-10700K!

Over the years, the Intel series of processors (CPUs) introduced the series of overclocking models "K" and more recently the series ...

The DeLorean can return as an electric car

The DMC DeLorean has been out of production for almost 40 years, but it looks like the iconic vehicle will return as an electric car.

Windows RDP servers are used to support DDoS

Cybercrime gangs are abusing Windows Remote Desktop Protocol (RDP) systems to reinforce the unwanted ...

SEPA: He refused to pay a ransom and thousands of files were leaked

Thousands of stolen files of the Scottish Environmental Protection Agency (SEPA) have been published by hackers, after the organization refused to pay the ransom ...

Fines at Valve, Capcom and Zenimax for geo-exclusion of games

Following a European Commission investigation, a group of video game publishers was fined € 7,8 million following allegations of geo-exclusion practices. In...