Breaking News

KIOXIA announced new version for their SSD Utility v6.0.0.22 TERRAMASTER RELEASES NEW CENTRALIZED BACKUP, A BACKUP SOLUTION FOR WINDOWS DESKTOPS AND SERVERS, FILE SERVERS AND VIRTUAL MACHINES LG Display Expands IT Industry Presence with Mass-Production of 17-inch Foldable OLED Panel for Laptops BIOSTAR Unveils Next-Gen H610MS and H610MHD D5 Motherboards Amazon and Anthropic Announce Strategic Collaboration to Advance Generative AI

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Microsoft Says Iranian Hackers Targeted U.S. Presidential Campaign

Microsoft Says Iranian Hackers Targeted U.S. Presidential Campaign

Enterprise & IT Oct 4,2019 0

Microsoft recently saw significant cyber activity by a threat group the company calls Phosphorous, which is beliebed to originate from Iran and is linked to the Iranian government.

In a 30-day period between August and September, the Microsoft Threat Intelligence Center (MSTIC) observed Phosphorous making more than 2,700 attempts to identify consumer email accounts belonging to specific Microsoft customers and then attack 241 of those accounts. The targeted accounts were associated with a U.S. presidential campaign, current and former U.S. government officials, journalists covering global politics and prominent Iranians living outside Iran. Microsoft said that four accounts were compromised as a result of these attempts; these four accounts were not associated with the U.S. presidential campaign or current and former U.S. government officials. Microsoft has notified the customers related to these investigations and threats and has worked as requested with those whose accounts were compromised to secure them.

Phosphorous, also known as APT 35, Charming Kitten, and Ajax Security Team, used information gathered from researching their targets or other means to game password reset or account recovery features and attempt to take over some targeted accounts. For example, they would seek access to a secondary email account linked to a user’s Microsoft account, then attempt to gain access to a user’s Microsoft account through verification sent to the secondary account. In some instances, they gathered phone numbers belonging to their targets and used them to assist in authenticating password resets.

While the attacks were not technically sophisticated, they attempted to use a significant amount of personal information both to identify the accounts belonging to their intended targets and in a few cases to attempt attacks. "This effort suggests Phosphorous is highly motivated and willing to invest significant time and resources engaging in research and other means of information gathering," said Tom Burt, Corporate Vice President, Customer Security & Trust, Microsoft.

Microsoft's Digital Crimes Unit has also taken legal and technical steps to combat Phosphorus attacks and continues to take these types of actions.

The company encourages all its customers to enable two-step verification on their Miccrosoft accounts which can be done in Account Security settings. While there are a number of ways to enable this two-step verification, the most secure option is through a password-less solution like Microsoft Authenticator.

People can also periodically check their login history.

Tags: HackingMicrosoft
Previous Post
Disney Bans Netflix Ads As the Battle for Streaming Supremacy Escalates
Next Post
Android Vulnerability Affects Pixel and Galaxy Devices

Related Posts

  • NVIDIA Studio Lineup Adds RTX-Powered Microsoft Surface Laptop Studio 2

  • Samsung and Microsoft Unveil First On-Device Attestation Solution for Enterprise

  • Introducing Xbox Game Pass Core, Coming This September

  • Announcing the next wave of AI innovation with Microsoft Bing and Edge

  • MSI has been hacked, be warned about where you download files

  • Microsoft Announces Security Copilot AI

  • Microsoft breaks new ground in healthcare with the next evolution of AI

  • ChatGPT is now available in Azure OpenAI Service

Latest News

KIOXIA announced new version for their SSD Utility v6.0.0.22
Enterprise & IT

KIOXIA announced new version for their SSD Utility v6.0.0.22

TERRAMASTER RELEASES NEW CENTRALIZED BACKUP, A BACKUP SOLUTION FOR WINDOWS DESKTOPS AND SERVERS, FILE SERVERS AND VIRTUAL MACHINES
Enterprise & IT

TERRAMASTER RELEASES NEW CENTRALIZED BACKUP, A BACKUP SOLUTION FOR WINDOWS DESKTOPS AND SERVERS, FILE SERVERS AND VIRTUAL MACHINES

LG Display Expands IT Industry Presence with Mass-Production of 17-inch Foldable OLED Panel for Laptops
Enterprise & IT

LG Display Expands IT Industry Presence with Mass-Production of 17-inch Foldable OLED Panel for Laptops

BIOSTAR Unveils Next-Gen H610MS and H610MHD D5 Motherboards
PC components

BIOSTAR Unveils Next-Gen H610MS and H610MHD D5 Motherboards

Amazon and Anthropic Announce Strategic Collaboration to Advance Generative AI
Enterprise & IT

Amazon and Anthropic Announce Strategic Collaboration to Advance Generative AI

Popular Reviews

Pioneer BDR-S13U-X Blu-Ray Recorder

Pioneer BDR-S13U-X Blu-Ray Recorder

Pioneer BDR-X13U-S

Pioneer BDR-X13U-S

Pioneer BDR-XD08UMB-S External Blu-Ray Recorder

Pioneer BDR-XD08UMB-S External Blu-Ray Recorder

Arctic Liquid Freezer II 360 Α-RGB

Arctic Liquid Freezer II 360 Α-RGB

Surefire KINGPIN M2 Keyboard

Surefire KINGPIN M2 Keyboard

Verbatim External 4K Slimline Blu-Ray Recorder

Verbatim External 4K Slimline Blu-Ray Recorder

Samsung 970 EVO Plus 2TB NVME SSD

Samsung 970 EVO Plus 2TB NVME SSD

Crucial X8 4TB PortableSSD

Crucial X8 4TB PortableSSD

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed