Microsoft "senior leadership" emails accessed by Russian SolarWinds hackers
Briefly

"Beginning in late November 2023, the threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account's permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents," says the Microsoft Security Response Center.
"The attack was not the result of a vulnerability in Microsoft products or services. To date, there is no evidence that the threat actor had any access to customer environments, production systems, source code, or AI systems," says Microsoft.
Read at The Verge
[
add
]
[
|
|
]