Anonymous ID: df8b62 June 26, 2021, 8:34 a.m. No.13988436   🗄️.is 🔗kun   >>8487 >>8640

>>13988427

>https://www.reuters.com/technology/microsoft-says-new-breach-discovered-probe-suspected-solarwinds-hackers-2021-06-25/

SAN FRANCISCO, June 25 (Reuters) - Microsoft (MSFT.O) said on Friday an attacker had won access to one of its customer-service agents and then used information from that to launch hacking attempts against customers.

The company said it had found the compromise during its response to hacks by a team it identifies as responsible for earlier major breaches at SolarWinds (SWI.N) and Microsoft.

Microsoft said it had warned the affected customers. A copy of one warning seen by Reuters said that the attacker belonged to the group Microsoft calls Nobelium and that it had access during the second half of May.

"A sophisticated Nation-State associated actor that Microsoft identifies as NOBELLIUM accessed Microsoft customer support tools to review information regarding your Microsoft Services subscriptions," the warning reads in part. The U.S. government has publicly attributed the earlier attacks to the Russian government, which denies involvement.

When Reuters asked about that warning, Microsoft announced the breach publicly.

After commenting on a broader phishing campaign that it said had compromised a small number of entities, Microsoft said it had also found the breach of its own agent, who it said had limited powers.

The agent could see billing contact information and what services the customers pay for, among other things.

"The actor used this information in some cases to launch highly-targeted attacks as part of their broader campaign," Microsoft said.

Microsoft warned affected customers to be careful about communications to their billing contacts and consider changing those usernames and email addresses, as well as barring old usernames from logging in.

Microsoft said it was aware of three entities that had been compromised in the phishing campaign.

It did not immediately clarify whether any had been among those whose data was viewed through the support agent, or if the agent had been tricked by the broader campaign.

Microsoft did not say whether the agent was at a contractor or a direct employee.

A spokesman said the latest breach by the threat actor was not part of Nobelium's previous successful attack on Microsoft, in which it obtained some source code.

In the SolarWinds attack, the group altered code at that company to access SolarWinds customers, including nine U.S. federal agencies.

At the SolarWinds customers and others, the attackers also took advantage of weaknesses in the way Microsoft programs were configured, according to the Department of Homeland Security.

Microsoft later said that the group had compromised its own employee accounts and taken software instructions governing how Microsoft verifies user identities.

DHS' Cybersecurity and Infrastructure Security Agency did not respond to a request for comment.

Anonymous ID: df8b62 June 26, 2021, 8:39 a.m. No.13988464   🗄️.is 🔗kun   >>8471

>>13988459

>So if we are in a simulation, is it kinda like the matrix? our actual bodies are covered in goo sitting in a pod on some other planet?

What difference at this point does it make?

Anonymous ID: df8b62 June 26, 2021, 8:46 a.m. No.13988502   🗄️.is 🔗kun

https://uk.pcmag.com/security/134150/microsoft-warns-of-continued-attacks-by-the-nobelium-hacking-group

Microsoft Warns of Continued Attacks by the Nobelium Hacking Group

Microsoft says the Nobelium hackers who have targeted SolarWinds, USAID, and other organizations managed to access information stored on one of its employees’ devices.

Microsoft said it “detected information-stealing malware on a machine belonging to one of our customer support agents with access to basic account information for a small number of our customers” and that “the actor used this information in some cases to launch highly-targeted attacks as part of their broader campaign.” The affected customers were notified of the breach.

Nobelium followed up the SolarWinds cyberattack in May with a campaign against the US Agency for International Development (USAID). The group reportedly used one of USAID’s email marketing tools to send phishing messages to more than 150 organizations. Those messages contained a link used to distribute malware that could steal data, infect other devices, and more.

Microsoft said Nobelium’s recent targets were “primarily IT companies (57%), followed by government (20%), and smaller percentages for non-governmental organizations and think tanks, as well as financial services.” The company said 45% of those targets were based in the U.S., 10% were based in the U.K., and the rest were spread across 36 different countries.

Few of those attacks bore fruit, however, with Microsoft saying Nobelium was only able to successfully compromise three of its targets. (It didn’t publicly disclose those targets, but it did say they were “being contacted through our nation-state notification process.”) It’s possible that successful attacks went unnoticed, but for now it seems Nobelium’s efforts have been ineffective.

Gaining access to the Microsoft customer support agent’s device might have change that, but the company said that its “support agents are configured with the minimal set of permissions required as part of our Zero Trust ‘least privileged access’ approach to customer information.” That approach helps keep Microsoft’s customers safe from rogue employees and malware alike.

 

https://msrc-blog.microsoft.com/2021/06/25/new-nobelium-activity/

Anonymous ID: df8b62 June 26, 2021, 9:24 a.m. No.13988670   🗄️.is 🔗kun   >>8693 >>8703 >>8827

Former “Smallville” star Allison Mack provided an audio tape that helped convict an Upstate New York sex cult leader, federal prosecutors said in a memo Monday.

Variety reports Mack, who faces 14 to 17 1/2 years in prison for her role in the NXIVM case, secretly recorded the group’s “Vanguard” Keith Raniere talking about how he branded his “slaves.”

“Do you think the person who’s being branded should be completely nude and sort of held to the table like a, sort of almost like a sacrifice?” he said at one point, adding that videotaping the ritual can be used as collateral to keep the person from leaving the group.

“And the person should ask to be branded,” Raniere said. “Should say, please brand me it would be an honor, or something like that. An honor I want to wear for the rest of my life, I don’t know… And they should probably say that before they’re held down, so it doesn’t seem like they are being coerced.”