Russian cyber spies infiltrated Microsoft’s systems, accessed source code

Russian cyber spies infiltrated Microsoft’s systems, accessed source code

Microsoft has shared additional details on the hacker attack where a Russian government-backed group tracked as Midnight Blizzard compromised Microsoft’s corporate systems and gained access to the email accounts of the company’s employees, including senior staff, and “exfiltrated some emails and attached documents.”

In an update posted last week, Microsoft said that the threat actor, also known as APT29, Cozy Bear and Nobelium, used the stolen data to access some of the company’s source code repositories and internal systems. At present, there’s no evidence that customer systems were affected by the incident.

“It is apparent that Midnight Blizzard is attempting to use secrets of different types it has found. Some of these secrets were shared between customers and Microsoft in email, and as we discover them in our exfiltrated email, we have been and are reaching out to these customers to assist them in taking mitigating measures,” Microsoft noted in the blog post. “Midnight Blizzard has increased the volume of some aspects of the attack, such as password sprays, by as much as 10-fold in February, compared to the already large volume we saw in January 2024.”

Midnight Blizzard, notably, is the same threat actor believed to be responsible for the infamous SolarWinds breach back in 2020. The group has previously targeted the United States and NATO countries. In 2022, the threat actor has focused on targeting organizations responsible for influencing and crafting the foreign policy of NATO countries. The group has been observed using newer tactics that involve abusing various Microsoft 365 features in order to evade detection.

Last month, the Five Eyes (FVEY) alliance released a joint cybersecurity advisory highlighting new strategies employed by Midnight Blizzard, more specifically, its methods to infiltrate organizations that have migrated to cloud-based infrastructures.


Back to the list

Latest Posts

Kosovo man extradited to US for running BlackDB.cc criminal marketplace

Kosovo man extradited to US for running BlackDB.cc criminal marketplace

If convicted on all counts, Masurica faces up to 55 years in federal prison.
14 May 2025
Multiple actively exploited zero-days patched in Microsoft, Ivanti, and Fortinet products

Multiple actively exploited zero-days patched in Microsoft, Ivanti, and Fortinet products

Microsoft shipped patches for over 70 flaws, five of which have been flagged as actively exploited zero-day bugs.
14 May 2025
Chinese hackers exploit SAP NetWeaver in cyber campaigns targeting critical infrastructure

Chinese hackers exploit SAP NetWeaver in cyber campaigns targeting critical infrastructure

The flaw was exploited to gain access to enterprise systems globally.
14 May 2025