Microsoft executive emails hacked by Russian intelligence group, company says

Must read

‘Oppenheimer’ steamrolls toward Oscars with Screen Actors Guild Award wins

Oppenheimer film billboard in Times Square, NYC on July 29th, 2023.Adam Jeffery | CNBCHistorical epic "Oppenheimer" picked up more prizes on Saturday at Hollywood's...

Smartphone giants like Samsung are going to talk up ‘AI phones’ this year — here’s what that means

Samsung Electronics Co. Galaxy S24 smartphones during a media preview event in Seoul, South Korea, on Monday, Jan. 15, 2024. Samsung, the world's most...

House China committee demands Elon Musk open SpaceX Starshield internet to U.S. troops in Taiwan

Elon Musk, CEO of Tesla and X, speaks at the Atreju political convention organized by Fratelli d'Italia (Brothers of Italy), in Rome, Dec. 15,...

U.S. and British strikes on Houthi sites in Yemen answer militants’ surge in Red Sea attacks on ships

The U.S. and Britain struck 18 Houthi targets in Yemen on Saturday, answering a recent surge in attacks by the Iran-backed militia group on...

Satya Nadella, CEO of Microsoft.

CNBC

Microsoft said in a Friday regulatory filing that a Russian intelligence group accessed some of the software maker’s top executives’ email accounts. Nobelium, the same group that breached government supplier SolarWinds in 2020, carried out the attack, which Microsoft detected last week, according to the company.

It isn’t the first time Russian hackers have gained entry into Microsoft’s systems. State-sponsored attacks that can result in the dissemination of sensitive data becomes a greater risk during periods of armed conflict, and Russia’s war against Ukraine has been going on for almost two years now. On Thursday, Russia said Ukrainian forces conducted drone strikes in multiple Russian locations.

Microsoft’s announcement comes after new U.S. requirements for disclosing cybersecurity incidents went into effect. A Microsoft spokesperson said that while the company does not believe the attack had a material effect, it still wanted to honor the spirit of the rules.

The Cybersecurity and Infrastructure Security Agency is “closely coordinating with Microsoft to gain additional insights into this incident and understand impacts so we can help protect other potential victims,” CISA executive assistant director for cybersecurity Eric Goldstein said in a statement to CNBC. “As noted in Microsoft’s announcement, at this time we are not aware of impacts to Microsoft customer environments or products.” 

In late November, the group accessed “a legacy non-production test tenant account,” Microsoft’s Security Response Center wrote in the blog post. After gaining access, the group “then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents,” the corporate unit wrote.

The company’s senior leadership team, including Chief Financial Offer Amy Hood and President Brad Smith, regularly meets with CEO Satya Nadella.

Microsoft said it has not found signs that Nobelium had accessed customer data, production systems or proprietary source code.

The U.S. government and Microsoft consider Nobelium to be part of the Russian foreign intelligence service SVR. The hacking group was responsible for one of the most prolific breaches in U.S. history when it added malicious code to updates to SolarWinds’ Orion software, which some U.S. government agencies were using. Microsoft itself was ensnared in the hack.

Nobelium, also known as APT29 or Cozy Bear, is a sophisticated hacking group that has attempted to breach the systems of U.S. allies and the Department of Defense. Microsoft also uses the name Midnight Blizzard to identify Nobelium.

It was also implicated alongside another Russian hacking group in the 2016 breach of the Democratic National Committee’s systems.

Last year, a vulnerability in Microsoft software allowed China-aligned hackers to access the email accounts of senior government officials, including Commerce Secretary Gina Raimondo, ahead of a critical U.S.-China meeting. The company’s “negligent cybersecurity practices” led to the attack, Sen. Ron Wyden, a Democrat from Oregon, wrote in a letter to CISA director Jen Easterly, and other federal officials.

“We are continuing our investigation and will take additional actions based on the outcomes of this investigation and will continue working with law enforcement and appropriate regulators,” the Microsoft blog post said.

The Federal Bureau of Investigation told CNBC that it knows about the attack and is working with federal partners to help.

Don’t miss these stories from CNBC PRO:

More articles

Latest article

‘Oppenheimer’ steamrolls toward Oscars with Screen Actors Guild Award wins

Oppenheimer film billboard in Times Square, NYC on July 29th, 2023.Adam Jeffery | CNBCHistorical epic "Oppenheimer" picked up more prizes on Saturday at Hollywood's...

Smartphone giants like Samsung are going to talk up ‘AI phones’ this year — here’s what that means

Samsung Electronics Co. Galaxy S24 smartphones during a media preview event in Seoul, South Korea, on Monday, Jan. 15, 2024. Samsung, the world's most...

House China committee demands Elon Musk open SpaceX Starshield internet to U.S. troops in Taiwan

Elon Musk, CEO of Tesla and X, speaks at the Atreju political convention organized by Fratelli d'Italia (Brothers of Italy), in Rome, Dec. 15,...

U.S. and British strikes on Houthi sites in Yemen answer militants’ surge in Red Sea attacks on ships

The U.S. and Britain struck 18 Houthi targets in Yemen on Saturday, answering a recent surge in attacks by the Iran-backed militia group on...

Broadcom reportedly nears $3.8 billion sale of remote access unit to KKR

A sign on the campus offices of chipmaker Broadcom is shown in Irvine, California.Mike Blake | ReutersChipmaker Broadcom is nearing a $3.8 billion deal...