Microsoft logo Photograph:( Reuters )
Over 20,000 United States organisations have been compromised in the aftermath of an attack on Microsoft's email software
Over 20,000 United States organisations have been compromised in the aftermath of an attack on Microsoft's email software.
According to media reports, the hack has affected more than the download from SolarWinds Corp, which witnessed a massive hack in December 2020. Reuters cited a person familiar with the US government's response on Friday as saying that the organisations suffered after a back door was installed, capitalising on pre-existing flaws in the software.
In addition, the hack has affected thousands of organisations across Asia and Europe. Even then, despite emergency patches, the hacks continue to plague the company. Initially, Microsoft claimed that the hacks consisted of "limited and targeted attacks", but did not comment on the intensity of the issue.
It added, "impacted customers should contact our support teams for additional help and resources." A scan of the connected devices showed that only 10 per cent of the vulnerable had installed the patches by Friday.
Also read: SolarWinds hack was work of more than 1,000 engineers: Microsoft
On Tuesday, the company claimed that the hacking group infiltrated the email inboxes. Microsoft claimed in a blog post that hackers took advantage of vulnerabilities that were previously unknown. Reportedly, four vulnerabilities were found in Microsoft's email software. The group which hacked the company is being referred to as HAFNIUM, which Microsoft claims is linked to China.
In another post, Volexity - a cybersecurity firm - claimed that it observed hackers using one of the four software loopholes to steal "full contents of several user mailboxes". The hackers only required details of an exchange server, and information about the account they intended to hack.
Also read: Microsoft planned to buy social media firm Pinterest: Report
Over the years, many countries including the United States have accused China of overseeing cyber espionage activities, something Chinese authorities continue to deny. Even before Microsoft officially acknowledged the hack, the activities of hackers had begun to garner attention from analysts in the cybersecurity community.
Mike McLellan, the director of intelligence for Dell Technologies Inc's Secureworks, was cited by Reuters as saying that they witnessed a spike in activity on Exchange servers over Sunday. Even at that firm, 10 customers have been affected. According to McLellan, hacking activity had gone up with focus on seeding malicious software, which could also highlight potential intrusions that could infect Microsoft's networks.
According to Microsoft, the targets of the Chinese hackers included researchers for infectious diseases, education institutions, defence contractors, policy think tanks, and NGOs.