Skip to main content

Microsoft Warns Russian Intelligence Accused of Mounting Cyberattack

The Russian hackers are known to be behind the SolarWinds and targeting government agencies. 

The SolarWinds attacks first started in the year 2020 and were continued throughout the year. On Thursday, Microsoft disclosed a cyberattack with large-scale, which is known to be operated by hackers that are linked to Russian intelligence. The same intelligence suspected to be behind the SolarWinds hack. According to the reports, it is known that the hackers have accessed an email system utilized by U.S. Agency for International Development, which is a State Department agency that works on foreign aid. The malicious emails were sent by hackers to approximately 3,000 individual accounts, which is more than 150 organizations, and this threat alert was sent by Microsoft on Thursday. 



Vice President of Microsoft Tom Burt stated in a post on Thursday that hackers seem to have target organizations of many humanitarian and human rights. In the United States, many organizations received attacks with the largest share, and it was also noted that targeted victims crossed at least 24 countries. Some of those malicious emails were sent recently this week, and it is suspected by Microsoft that the attacks might still be ongoing. The attacks have been analyzed as the continuation of the process of hacking to target agencies of government focused on foreign policy, which is known to be a part of intelligence with gathering the efforts. 

The recent cyberattack was discovered over a month when the U.S officially implemented the sanctions against Russia for allegedly committing malicious cyber activity and interfering in the election, which includes widely spread SolarWinds attacks as well. According to the key intelligence agencies, it has already been said that Russia is most likely to be the origin of the SolarWinds hack, which has utilized malicious software from IT management company SolarWinds to infiltrate multiple U.S. federal agencies, including approximately 100 private organizations.

On Friday, in an interview with CNN, Austin Lloyd, Defense Secretary, stated that the U.S has numerous ways of utilizing offensive options to counter back on the cyberattacks. However, the statement was not in the preference of recent attacks. Recently, Austin conveyed to CNN how important the cyber domain is, as it is specifically known as the part of the battlespace and architecture, which is something that should be in the extra attentive process, including being dominant in that particular area. 

The spokesperson of USAID, Pooja Jhunjhunwala, conveyed that the agency is fully aware of potentially malicious email activities happening from the compromised constant contact email marketing account and also told about the forensic investigation that is in the process right now. According to the reports, a spokesperson of the U.S Cybersecurity and Infrastructure Security Agency said that CISA is processing the investigation with USAID and FBI to dig up the whole situation of compromise with better understanding and guide the victims. 

Phishing Emails with authenticated appearance:

According to the reports of Microsoft, the investigation to track this new ongoing hacking campaign has been running since January 2021, and the situation got dense on Tuesday when the legitimate mass email service was anchored by hackers to pretend as the US-based development organization and distribute infected URLs to the wide variety of organizations and private industries. According to Microsoft, as the data transfer of malicious email was heavy, some of them might have stopped via spam filter, but it is possible that the rest of them passed the automated systems to the targeted destinations. 

Microsoft added in its report, if in case a person clicked on the sent links in the email, it would have provided the hackers with access to the compromised systems via uploading a malicious file.

Source:-https://webrootcom.com/blog/microsoft-warns-russian-intelligence-accused-of-mounting-cyberattack/

Comments

Popular posts from this blog

Lyft’s New Electric Cycle with Speakers and Screen

Electric vehicles are the future of a clean and green world. We know it and want to switch to an electric variant. American bike-sharing company Lyft has introduced a new electric cycle, which is a blend of modern and traditional design. Its specialty is its powerful battery, which allows the electric cycle to run for up to 96.5 km in a single charge. It has a 500-Watt electric motor. The company is yet to share information about the top speed of this electric bike. The company has kept the design like a traditional cycle but has also made it attractive. It has the battery and all the cables fitted inside the frame. This makes the design of this electric cycle look very clean. Lyft has shared a lot of information about the new electric bike, aka electric cycle, in the US through his blog. The new electric cycle is designed so that it retains the modern appearance and the outline of the traditional cycle. It has batteries and other cables set inside the middle frame. The front and back ...

Here’s How You Can Get Rid of the Split Screen on an iPhone and iPad

Apple designs its every product keeping in mind the interests and productivity of its users. And it keeps on introducing many new features with its every update. The iPhone and iPad are one of Apple’s great devices used by millions of users for different purposes. These devices come with various amazing features that anyone can easily use to have the best experience. If you are a new user of an iPad or iPhone, you must learn and master their functionalities. iPhone and iPad, both of the devices are known for their multitasking functionalities, and the Split Screen feature is also a part of the iPhone and iPad. Anyone of the Apple device users can easily enable and use this feature on their devices. Source:- https://mcafeecom.activatedirectory.com/heres-how-you-can-get-rid-of-the-split-screen-on-an-iphone-and-ipad/ The Split Screen feature is most appreciated as it enables you to access two apps on a single screen. With this feature, you can perform multitasking on your Apple devices. H...

Simple Steps for iPhone Lost Situation and Data Erasing Issue

If someone asks you or conducts a survey about the easily lost item which a person carries, the answer will be the phone. If it is an iPhone, it is the most valued item in today’s world, as you are not carrying only a phone but you are carrying the most important data related to you and your loved ones, and if some mischievous person found your iPhone, it will surely create a trouble for you. But you don’t have to worry. Apple is aware of this and created a superb mechanism for the problem. So, you lost your iPhone and are unable to find it after many attempts, and you don’t know how to find your missing iPhone or erase its data; This article will help you. We will show you how to track your location and delete the data in the iPhone before you get into the wrong hands. Apple’s Find My iPhone feature is very simple to use and allows you to find out the location of your missing iPhone; the phone starts playing sound. You can also delete the required data in your iPhone remotely if neede...