Russian cyber spies infiltrated Microsoft’s systems, accessed source code

Russian cyber spies infiltrated Microsoft’s systems, accessed source code

Microsoft has shared additional details on the hacker attack where a Russian government-backed group tracked as Midnight Blizzard compromised Microsoft’s corporate systems and gained access to the email accounts of the company’s employees, including senior staff, and “exfiltrated some emails and attached documents.”

In an update posted last week, Microsoft said that the threat actor, also known as APT29, Cozy Bear and Nobelium, used the stolen data to access some of the company’s source code repositories and internal systems. At present, there’s no evidence that customer systems were affected by the incident.

“It is apparent that Midnight Blizzard is attempting to use secrets of different types it has found. Some of these secrets were shared between customers and Microsoft in email, and as we discover them in our exfiltrated email, we have been and are reaching out to these customers to assist them in taking mitigating measures,” Microsoft noted in the blog post. “Midnight Blizzard has increased the volume of some aspects of the attack, such as password sprays, by as much as 10-fold in February, compared to the already large volume we saw in January 2024.”

Midnight Blizzard, notably, is the same threat actor believed to be responsible for the infamous SolarWinds breach back in 2020. The group has previously targeted the United States and NATO countries. In 2022, the threat actor has focused on targeting organizations responsible for influencing and crafting the foreign policy of NATO countries. The group has been observed using newer tactics that involve abusing various Microsoft 365 features in order to evade detection.

Last month, the Five Eyes (FVEY) alliance released a joint cybersecurity advisory highlighting new strategies employed by Midnight Blizzard, more specifically, its methods to infiltrate organizations that have migrated to cloud-based infrastructures.


Back to the list

Latest Posts

Let’s Encrypt ends expiration notification emails, citing privacy, cost, and complexity

Let’s Encrypt ends expiration notification emails, citing privacy, cost, and complexity

The organization says the decision to discontinue expiration emails is driven by rising operational costs, increasing privacy concerns, and efforts to simplify its infrastructure.
30 June 2025
UAC-0226 upgrades Giftedcrook malware for intelligence gathering on Ukraine

UAC-0226 upgrades Giftedcrook malware for intelligence gathering on Ukraine

V1.3 comes with expanded ability to exfiltrate a wide range of sensitive files.
30 June 2025
Crypto investment fraud ring dismantled in Spain after defrauding 5K victims worldwide

Crypto investment fraud ring dismantled in Spain after defrauding 5K victims worldwide

The Guardia Civil arrested five individuals who are believed to be key members of the international criminal network.
30 June 2025