Cloud Security, Threat Management, Email security
Lessons to learn from last week’s email breach on federal agencies by a Chinese APT group

Today’s columnist, Mike Britton of Abnormal Security, offers some insights to security teams looking to respond effectively following a major nation-state attack. Britton’s column focuses on last week’s news that Microsoft had mitigated an attack by a Chinese APT group. The attack targeted 25 organizations, including email accounts at the Commerce and State departments. (Stock Photo, Getty Images)
We learned early last week that a group of Chinese hackers exploited a vulnerability in Microsoft’s cloud email service to gain access to the cloud-based email accounts at 25 organizations.The attackers primarily targeted West European organizations, but there were also reports in the mainstream press that U.S. government agencies such as the Commerce and State departments were hacked.An investigation by Microsoft determined that this group – coined Storm-0558 – forged authentication tokens to compromise the email accounts, most likely to gain access to data residing in those systems for espionage purposes.Cyberattacks are happening all time and every day, but nation-state attacks are a different beast – not only because of their implications for national security, but also because they are typically very difficult to detect. These threat groups are highly selective in their targeting, compared to most cybercriminals who operate opportunistically, are incredibly sophisticated in their attack techniques, and have substantial funding to carry out their operations. The attack by Storm-0558 wasn’t a “smash and grab” scenario more typical of high-volume/low-yield spam and credential phishing attacks – it was an advanced and strategically-executed attack. Nation-state attackers have the resources and skills to break into accounts, and they can also go undetected once inside. In this attack, the Storm-0558 attackers were lurking within government email accounts, with access to the data in those accounts, for as long as a month before targeted agencies noticed anomalous mail activity.
An In-Depth Guide to Cloud Security
Get essential knowledge and practical strategies to fortify your cloud security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds