For the first time in the history of Microsoft, a cyberattack has left hundreds of executive accounts compromised and caused a major user data leak as Microsoft Azure was attacked.

According to Proofpoint, the hackers use the malicious techniques that were discovered in November 2023. It includes credential theft through phishing methods and cloud account takeover (CTO) which helped the hackers gain access to both Microsoft365 applications as well as OfficeHome.

  • Rentlar@lemmy.ca
    link
    fedilink
    arrow-up
    37
    ·
    9 months ago

    bing bing bing bing!

    “Sign into your Microsoft account” here…

    “Link your Microsoft account to Edge/[Insert MS product here]”

    “Let’s get you signed in” there.

    “Try our Windows Hello! A new method of accessing your Microsoft account!” over there.

    “Sorry you can’t use your organization account here, sign into your personal account”

    This is the monster Microsoft unleashed upon itself.

    • BeardedSingleMalt@kbin.social
      link
      fedilink
      arrow-up
      15
      ·
      9 months ago

      Microsoft, and all the cybersecurity folks who blindly accept any recommendation from third party firms.

      When we need to remote in to our work PCs we have to use our Microsoft account with MFA just to access the remote connections, then use the same credentials to access the pool, then if we want to RDP into our PC we use the same credentials.