ANL 12.62 Increased By ▲ 0.32 (2.6%)
ASC 14.65 Increased By ▲ 0.55 (3.9%)
ASL 15.60 Increased By ▲ 0.56 (3.72%)
AVN 104.25 Increased By ▲ 4.00 (3.99%)
BOP 8.42 Decreased By ▼ -0.01 (-0.12%)
CNERGY 6.47 Increased By ▲ 0.07 (1.09%)
FFL 9.17 Increased By ▲ 0.10 (1.1%)
FNEL 8.95 Increased By ▲ 0.28 (3.23%)
GGGL 13.40 Increased By ▲ 0.22 (1.67%)
GGL 20.88 Increased By ▲ 0.98 (4.92%)
GTECH 9.70 Increased By ▲ 0.30 (3.19%)
HUMNL 6.60 No Change ▼ 0.00 (0%)
KEL 3.16 Increased By ▲ 0.06 (1.94%)
KOSM 4.34 Increased By ▲ 0.29 (7.16%)
MLCF 33.65 Increased By ▲ 0.17 (0.51%)
PACE 4.20 Increased By ▲ 0.14 (3.45%)
PIBTL 7.24 Increased By ▲ 0.07 (0.98%)
PRL 14.34 Increased By ▲ 0.23 (1.63%)
PTC 8.68 Decreased By ▼ -0.01 (-0.12%)
SILK 1.34 Increased By ▲ 0.01 (0.75%)
SNGP 33.80 Increased By ▲ 0.20 (0.6%)
TELE 17.88 Increased By ▲ 0.63 (3.65%)
TPL 13.50 Increased By ▲ 0.48 (3.69%)
TPLP 28.02 Increased By ▲ 2.46 (9.62%)
TREET 39.69 Increased By ▲ 0.99 (2.56%)
TRG 83.30 Increased By ▲ 1.56 (1.91%)
UNITY 27.85 Increased By ▲ 0.54 (1.98%)
WAVES 15.05 Increased By ▲ 0.35 (2.38%)
WTL 2.22 Increased By ▲ 0.08 (3.74%)
YOUW 8.09 Increased By ▲ 0.55 (7.29%)
BR100 4,597 Increased By 11.2 (0.24%)
BR30 17,781 Increased By 212.3 (1.21%)
KSE100 45,018 Increased By 192.3 (0.43%)
KSE30 17,748 Increased By 81.8 (0.46%)

coronavirus
Coronavirus
VERY HIGH
Source: covid.gov.pk
Pakistan Deaths
29,065
2324hr
Pakistan Cases
1,353,479
7,67824hr
Sindh
516,874
Punjab
458,879
Balochistan
33,812
Islamabad
115,047
KPK
183,403

SAN FRANCISCO: Microsoft said on Friday an attacker had won access to one of its customer-service agents and then used information from that to launch hacking attempts against customers. The company said it had found the compromise during its response to hacks by a team it identifies as responsible for earlier major breaches at SolarWinds and Microsoft.

Microsoft said it had warned the affected customers. A copy of one warning seen by Reuters said that the attacker belonged to the group Microsoft calls Nobelium and that it had access during the second half of May.

"A sophisticated Nation-State associated actor that Microsoft identifies as NOBELLIUM accessed Microsoft customer support tools to review information regarding your Microsoft Services subscriptions," the warning reads in part. The US government has publicly attributed the earlier attacks to the Russian government, which denies involvement.

When Reuters asked about that warning, Microsoft announced the breach publicly. After commenting on a broader phishing campaign that it said had compromised a small number of entities, Microsoft said it had also found the breach of its own agent, who it said had limited powers.

The agent could see billing contact information and what services the customers pay for, among other things.

"The actor used this information in some cases to launch highly-targeted attacks as part of their broader campaign," Microsoft said.

Microsoft warned affected customers to be careful about communications to their billing contacts and consider changing those usernames and email addresses, as well as barring old usernames from logging in. Microsoft said it was aware of three entities that had been compromised in the phishing campaign. It did not immediately clarify whether any had been among those whose data was viewed through the support agent, or if the agent had been tricked by the broader campaign.

Microsoft did not say whether the agent was at a contractor or a direct employee. A spokesman said the latest breach by the threat actor was not part of Nobelium's previous successful attack on Microsoft, in which it obtained some source code.

In the SolarWinds attack, the group altered code at that company to access SolarWinds customers, including nine US federal agencies. At the SolarWinds customers and others, the attackers also took advantage of weaknesses in the way Microsoft programs were configured, according to the Department of Homeland Security.

Microsoft later said that the group had compromised its own employee accounts and taken software instructions governing how Microsoft verifies user identities. DHS' Cybersecurity and Infrastructure Security Agency did not respond to a request for comment.

Comments

Comments are closed.