TESTIMONIALS

โ€œReceived the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.โ€

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
Case Studies

US review of Microsoft cloud compromise

by Mark Rowe

A hacking group associated with the government of the Peopleโ€™s Republic of China, known as Storm-0558, compromised Microsoftโ€™s cloud last year, and struck โ€˜the espionage equivalent of goldโ€™. Thatโ€™s according to an official review of the Microsoft Exchange Online intrusion of summer 2023, released by the United States federal Department of Homeland Security (DHS).

The intrusion should never have happened, the review found. Storm-0558 was able to succeed because of โ€˜a cascade of security failures at Microsoftโ€™. The mailboxes of 22 organisations (including โ€˜severalโ€™ in the UK) and 500 people were compromised; the email accounts of the likes of Commerce Secretary Gina Raimondo, and United States Ambassador to the Peopleโ€™s Republic of China R Nicholas Burns. Microsoft reported three affected UK accounts to the UK official National Cyber Security Centre (NCSC).

The review found Microsoftโ€™s security culture was โ€˜inadequateโ€™ and requiring an overhaul, โ€˜particularly in light of the companyโ€™s centrality in the technology ecosystem and the level of trust customers place in the companyโ€™. In more detail, the report stated it had โ€˜identified a series of operational and strategic decisions that collectively point to a corporate culture in Microsoft that deprioritized both enterprise security investments and rigorous risk management. These decisions resulted in significant costs and harm for Microsoft customersโ€™.

Communications of diplomats and other officials, commercial trade secrets and intellectual property, everyday emails; all are โ€˜in the cloudโ€™. That makes cloud computing, as DHS Under Secretary of Policy and Cyber Safety Review Board (CSRB) Chair Robert Silvers put it, โ€˜some of the most critical infrastructure we haveโ€™. โ€œIt is imperative that cloud service providers prioritise security and build it in by design,โ€ he said.

CSRB Acting Deputy Chair Dmitri Alperovitch meanwhile termed the intrusion as โ€˜brazenโ€™, by hackers tracked by industry for 20 years and linked to similar 2009 and 2011 compromises. He said: โ€œThis Peopleโ€™s Republic of China affiliated group of hackers has the capability and intent to compromise identity systems to access sensitive data, including emails of individuals of interest to the Chinese government. Cloud service providers must urgently implement these recommendations to protect their customers against this and other persistent and pernicious threats from nation-state actors.โ€

This was the third such review by CSRB, set up in 2022. It found a failure by Microsoft to detect the compromise of its โ€˜cryptographic crown jewelsโ€™; instead the intrusion dated from May, and the US federal State Department detected anomalous activity on June 15, and notified Microsoft on June 16. Microsoft had failed to detect a compromise of an employee’s laptop from a recently acquired company prior to allowing it to connect to Microsoftโ€™s corporate network in 2021. The firm made inaccurate public statements about the incident, and failed to correct them for months. In a separate incident, disclosed by Microsoft in January 2024, another (Russian) โ€˜nation-state actorโ€™ accessed โ€˜highly-sensitive Microsoft corporate email accounts, source code repositories, and internal systemsโ€™.

The โ€˜crown jewelsโ€™ in IT terms are โ€˜signing keysโ€™, used for secure authentication into remote systems. Microsoft does not know how or when the hackers got the key, which they used with another flaw in Microsoftโ€™s authenticating to be able to access โ€˜any any Exchange Online account anywhereโ€™. The report called for a public plan by Microsoft with specific timelines to make fundamental, security-focused reforms across the company and its full suite of products; and that Microsoftโ€™s CEO should hold senior officers accountable for delivery. The report asked Microsoft to โ€˜deprioritize feature developments across the companyโ€™s cloud infrastructure and product suite until substantial security improvements have been madeโ€™. The report quoted a 2002 email to all staff by Microsoftโ€™s founder and then-CEO, Bill Gates, on choosing security when faced with a choice of โ€˜adding features and resolving security issuesโ€™. The review added that โ€˜Microsoft has drifted away from this ethos and needs to restore it immediatelyโ€™.

The document called on Microsoft and other cloud service providers to โ€˜take accountability for the security outcomes of their customersโ€™. It did state that โ€˜technical mechanisms exist today across the industry that can, if broadly implemented, significantly reduce the likelihood of complete system-level compromiseโ€™. As for digital Identity standards, the report said that the โ€˜current ecosystemโ€™ โ€˜does not provide the security necessary to counter modern threat actorsโ€™.

Microsoft in November launched a Secure Future Initiative (SFI), described by the firm as โ€˜a multi-year commitment advancing the way we design, build, test, and operate our technologyโ€™. Visit https://www.microsoft.com/en-us/security/blog/2024/03/06/enhancing-protection-updates-on-microsofts-secure-future-initiative.

The US Department of Homeland Security (DHS) meanwhile and European Commissionโ€™s Directorate General for Communications, Networks, Content, and Technology (DG CONNECT) announced an initiative to compare cyber incident reporting elements that will inform cyber incident reporting requirements by the US, and European Union (EU) under the NIS 2 Directive.

Related News