The Russia-linked cyberespionage group Midnight Blizzard<\/a> continues to target Microsoft users to steal other emails, warn the IT giant.
In January, Microsoft warned<\/a> that some of its corporate email accounts were compromised by a Russia-linked cyberespionage group known as\u00a0Midnight Blizzard<\/a>.\u00a0The company notified law enforcement and relevant regulatory authorities.
Microsoft also announced<\/a> that the Russia-linked APT\u00a0Midnight Blizzard<\/a>\u00a0that hit the company in late November 2023 has been targeting organizations worldwide as part of a large-scale cyberespionage campaign.
Now Microsoft\u2019s incident response team is contacting customer<\/a> administrators to provide a secure portal that allows them to view emails stolen by the Russia-linked Midnight Blizzard APT group.<\/p>\n\n\n\n
Below is the text of the message \"Action Required \u2013 Microsoft Email Data Sharing Request\":<\/gwmw><\/pre>\n\n\n\n \"This notification is related to the prior attack against Microsoft by the threat actor known as Midnight Blizzard, as disclosed through our 8-K filings and our\u00a0<\/em>Microsoft blog<\/em><\/a>\u00a0.<\/em>
You are receiving this notification because emails were exchanged between Microsoft and accounts in your organization, and those emails were accessed by the threat actor Midnight Blizzard as part of their cyber-attack on Microsoft.
<\/em>
As part of our commitment to transparency, we are proactively sharing these emails. We have custom built a secure system to enable the approved members of your organization to review the exfiltrated emails between Microsoft and your company. \u00a0
In order to grant access to the above-referenced emails, you are required to identify authorized individuals within your organization who can nominate reviewers. As needed, please reach out to the appropriate parties in your organization who have the authority to nominate reviewers to view these emails.
At the bottom of this email is a link which will take you to a secure form where you will be asked to provide the following information:
\u00a0\u00a0\u00a0\u00a0\u00a0\u2022 Your organization\u2019s TenantID
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0o If you do not know or are unsure of your TenantID, please follow the steps outlined here:\u00a0https:\/\/aka.ms\/gettenantid<\/a>
\u00a0\u00a0\u00a0\u00a0\u00a0\u2022 The access code located at the bottom of this email
\u00a0\u00a0\u00a0\u00a0\u00a0\u2022 The email addresses for individuals within your organization who can nominate reviewers who will be granted access to the set of exfiltrated emails.
Once you complete this form, Microsoft will contact those who have been identified with instructions on how to identify reviewers.\u202f
Should you or your organization require support during this process please work with your Customer Success Account Manager (CSAM) or account representative(s) to open a support case and reference Microsoft Email Data Sharing. \u00a0Microsoft continues to prioritize transparency and learnings from events like these to help protect customers and our own enterprise.
Our investigation is ongoing, if we discover new information, we will tell you as soon as practicable.\"<\/pre>\n\n\n\nSecure Link:\u00a0https:\/\/purviewcustomer.powerappsportals.com\/?dnaynpyvmule<\/a><\/gwmw><\/pre>\n\n\n\n This week TeamViewer discovered that a threat actor has breached its corporate network and some reports attribute the intrusion to the Russia-linked APT group\u00a0APT29<\/a>\u00a0(aka\u00a0SVR group<\/a>,\u00a0BlueBravo<\/a>,\u00a0Cozy Bear<\/a>,\u00a0Nobelium<\/a>,\u00a0Midnight Blizzard<\/a>, and\u00a0The Dukes<\/a>).<\/p>\n\n\n\n
Pierluigi\u00a0Paganini<\/strong><\/a>
<\/gwmw><\/p>\n\n\n\n Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, newsletter)<\/strong>
<\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"