A recent cybersecurity breach of U.S. government emails may have reached further than initially thought, according to a new report by the cybersecurity firm Wiz.inc.
The U.S. government has provided few details about the exact extent of this hacking incident. Reports have indicated that email accounts for U.S. Commerce Secretary Gina Raimondo were impacted, as were accounts belonging to U.S. Ambassador to China Nicholas Burns, and Assistant Secretary of State for East Asian and Pacific Affairs Daniel Kritenbrink.
At a July 12 press briefing, officials with the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said that no sensitive information was stolen during the hack.
“Our researchers concluded that the compromised MSA key could have allowed the threat actor to forge access tokens for multiple types of Azure Active Directory applications, including every application that supports personal account authentication, such as SharePoint, Teams, OneDrive, customers’ applications that support the ‘login with Microsoft’ functionality, and multi-tenant applications in certain conditions,” wrote Wiz researcher Shir Tamari.
While Microsoft says it has mitigated the threat posed by the hacked MSA key and published new indicators of compromises, Wiz assessed that “it may be difficult for customers to detect the use of forged tokens against their applications due to lack of logs on crucial fields related to the token verification process.”
Microsoft has denied Azure Active Directory applications have been harmed by the Storm-0558 hack.
Microsoft Increasing Security Measures
This cybersecurity breach has brought scrutiny on Microsoft and its contracts with various corporate and government offices.Sen. Ron Wyden (D-Ore.) said Microsoft should offer all of its full forensic capabilities to all of its customers, saying that “charging people for premium features necessary to not get hacked is like selling a car and then charging extra for seatbelts and airbags.”
Amid this pressure, Microsoft announced on July 19 that it would begin providing its standard Microsoft Purview Audit customers with “deeper visibility into security data, including detailed logs of email access and more than 30 other types of log data previously only available at the Microsoft Purview Audit (Premium) subscription level.”
“In response to the increasing frequency and evolution of nation-state cyberthreats, Microsoft is taking additional steps to protect our customers and increase the secure-by-default baseline of our cloud platforms,” the company announced. “These steps are the result of close coordination with commercial and government customers, and with the Cybersecurity and Infrastructure Security Agency (CISA) about the types of security log data Microsoft provides to cloud customers for insight and analysis.”