Microsoft has been targeted by a nation-state cyberattack attributed to the Russian state-sponsored actor Midnight Blizzard, also known as Nobelium, which is the same group behind the 2020 SolarWinds attack. The attack on Microsoft's corporate systems was detected on January 12, 2024, leading to the infiltration of Microsoft leaders' email accounts. In a separate but related cybersecurity threat, a Chinese cyber espionage group named UNC3886 has been exploiting a critical zero-day vulnerability in VMware vCenter Server (CVE-2023-34048) since late 2021, which was only patched in October 2023.
#Microsoft says that a Russian state-sponsored group has hacked into its corporate systems and stole some emails and documents from staff accounts. #Russia https://t.co/znsqqAVZYr
A China-linked cyber espionage group called UNC3886 has been exploiting a zero-day #vulnerability in #VMware vCenter Server (CVE-2023-34048) since late 2021. Learn more: https://t.co/oKqtCCgPyo #Cybersecurity #Hacking
Chinese then, Russians now. Microsoft really needs better security. https://t.co/5MCWWHssLk
Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard | MSRC Blog | Microsoft Security Response Center // This provides no information. https://t.co/F3EInCwvuS
The same group that carried out the SolarWinds attack that hit Microsoft and U.S. government agencies in 2020 infiltrated Microsoft leaders’ email accounts. https://t.co/iqVM5UzVEh
Microsoft Reports Hack by Nation-State Actor https://t.co/tMHCrQ5Cl3
“The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024. [...] Microsoft has identified the threat actor as Midnight Blizzard, the Russian state-sponsored actor also known as Nobelium.” https://t.co/EBJVJYJRqP
🚨 Nation-state attack on Microsoft corporate systems by Midnight Blizzard, the Russian state-sponsored actor also known as Nobelium. 🚨 https://t.co/36cmw79XDw https://t.co/l8Ic7f7Uv0
Interesting! Microsoft detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response process to investigate, disrupt malicious activity, mitigate the attack, and deny the threat actor further access. https://t.co/y0zHH3WLH6
🇨🇳 cyber espionage group UNC3886 has been exploiting a critical vulnerability (CVE-2023-34048) in VMware vCenter Server as a zero-day since at least late 2021. The flaw wasn’t patched until Oct 2023.  https://t.co/ifL1Fj3LNU https://t.co/E368DI0tOS