Chinese hackers exploit code flaw, steal US emails

TL;DR Breakdown

  • Chinese hackers reportedly exploited a flaw in Microsoft’s code to steal emails from U.S. government agencies and other clients.
  • The hackers used a Microsoft digital key, but how they obtained it remains unclear.
  • The breach started in May and has affected around 25 organizations, including the State and Commerce Departments.

Description

In a surprising breach of digital security, Microsoft, the Redmond, Washington-based tech giant, recently disclosed that cyber intruders of Chinese origin exploited a flaw in the company’s software code, culminating in the theft of emails from U.S. government agencies and several other clients. The severe incident has sent shockwaves through the cybersecurity industry and incited … Read more

In a surprising breach of digital security, Microsoft, the Redmond, Washington-based tech giant, recently disclosed that cyber intruders of Chinese origin exploited a flaw in the company’s software code, culminating in the theft of emails from U.S. government agencies and several other clients.

The severe incident has sent shockwaves through the cybersecurity industry and incited further tension in the already fraught China-U.S. relations.

A cyber espionage saga

The alleged Chinese cyber culprits reportedly procured a digital key belonging to Microsoft. The precise means through which they gained access to this vital digital instrument remains murky, casting a cloud of doubt over the company’s internal security measures.

Capitalizing on the acquired key, the hackers then exploited a “validation error” in Microsoft’s programming, thereby orchestrating a widespread cyber espionage campaign.

This furtive operation began as early as May and saw cyber assailants infiltrating around 25 organizations’ email accounts. Officials noted that the victims included two prominent U.S. government bodies, the State and Commerce Departments.

China, however, has vehemently denied any involvement in the hacking activities.

An international ripple effect

These cyber transgressions have attracted the attention of the international community.

During a diplomatic meeting in Jakarta, Secretary of State Antony Blinken expressed profound concern over any action targeting the U.S. government, American corporations, or citizens to his Chinese counterpart, Wang Yi.

He further asserted that the U.S. would not hesitate to hold the responsible parties accountable.

Simultaneously, the United Kingdom’s National Cyber Security Centre (NCSC), an offshoot of the GCHQ spy agency, stated it was working closely with Microsoft to understand the full extent of the fallout from this comprehensive hacking operation.

A spokesperson from the NCSC confirmed that their focus is on discerning the incident’s impact in the UK.

Microsoft responds amidst criticism

Following the public revelation of the breach, Microsoft has found itself in the eye of a storm, fielding criticism over its security practices. Many officials and legislators are urging the company to provide its highest tier of digital auditing, known as logging, free to all its customers.

In response to the flak, Microsoft affirmed in a recent statement its commitment to take the criticisms into account. It stated, “We are evaluating feedback and are open to other models,” highlighting that it remains “actively engaged” with U.S. officials on this critical issue.

Despite this admission, the circumstances surrounding the initial breach – particularly how the Chinese hackers procured Microsoft’s digital key – remain shrouded in mystery.

This absence of clarity has led to conjecture that Microsoft itself might have been hacked prior to the email thefts, thus underscoring the serious questions this incident raises about cybersecurity.

In summary, the unfolding narrative of Chinese hackers exploiting a code flaw to steal U.S. emails has left a stark reminder of the fragility of cybersecurity in the face of sophisticated hacking operations.

Amid escalating international tensions and questions over corporate responsibility, the cybersecurity industry must now grapple with the aftermath and the need for reinforced security measures to prevent future incidents.

Disclaimer: The information provided is not trading advice. Cryptopolitan.com holds no liability for any investments made based on the information provided on this page. We strongly recommend independent research and/or consultation with a qualified professional before making any investment decision.

文章来源于互联网:Chinese hackers exploit code flaw, steal US emails

Disclaimers:

1. You are solely responsible for your investment decisions and this info is not liable for any losses you may incur.

2. The copyright of this article belongs to the writer, it represents the writer's opinions only, not represents the site's ones. Not financial advice.

Previous 2023年7月17日 07:39
Next 2023年7月17日 09:42

Related articles

  • Huobi’s Token burn strategy skyrockets user confidence in Huobi Token (HT)

    TL;DR Breakdown Huobi burns a record-breaking 298,940,224 HT tokens, boosting user confidence. Quarterly token burning contributes to a deflation rate of 0.9066% in HT circulation. Huobi transitions from monthly to quarterly burning cycles to enhance transparency. Description Hong Kong-based cryptocurrency exchange Huobi recently expressed gratitude to loyal users for their unwavering support and confidence in Huobi Token (HT). In a newly released report, Huobi highlighted significant developments, including a groundbreaking token burn in the second quarter of 2023. A remarkable 298,940,224 HT has been burnt by Huobi as of July 15th, 2023, … Read more Hong Kong-based cryptocurrency exchange Huobi recently expressed gratitude to loyal users for their unwavering support and confidence in Huobi Token (HT). In a newly released report, Huobi highlighted significant developments, including a groundbreaking token burn in the second quarter of 2023. A remarkable 298,940,224 HT has been burnt by Huobi as of July 15th, 2023, with 1,950,555 HT burned in Q2 2023 alone. This relentless token combustion strategy has contributed to a noteworthy quarterly deflation rate of 0.9066% in circulation. Presently, are 201,050,000 HT available,…

    Article 2023年7月17日
  • Controversial Crypto Market Structure Bill Unveiled by House Republicans

    TL;DR Breakdown House Republicans introduce a bill to regulate the crypto market, granting the CFTC more authority over digital asset commodity markets. House Democrats criticize the bill, considering it a “handout” to the crypto industry, and prefer the SEC to oversee the crypto market instead. Description In a highly contentious move, House Republicans recently introduced a bill focused on regulating the crypto market structure. However, the proposal has faced immediate pushback from Democrats on the House Agriculture Committee, who criticize the bill for allegedly favoring the crypto industry with unnecessary privileges.  The bill, titled the Financial Innovation and Technology for the … Read more In a highly contentious move, House Republicans recently introduced a bill focused on regulating the crypto market structure. However, the proposal has faced immediate pushback from Democrats on the House Agriculture Committee, who criticize the bill for allegedly favoring the crypto industry with unnecessary privileges.  The bill, titled the Financial Innovation and Technology for the 21st Century Act, was introduced by House Agriculture Committee Chair Glenn Thompson, R-Pa., along with Rep. French Hill, R-Ark., and Rep….

    Article 2023年7月22日
  • What’s the Future of Cryptocurrency? A Tour Of The Industry’s Prospects

    Cryptocurrencies have been gaining momentum ever since their inception, but it is the price of Bitcoin that is acting as the main tug for the entire industry and as the most attractive instrument for investors. It is investors who determine the path of development of absolutely any invention or undertaking, or, more correctly – human avarice. Though it is true that for an invention to become successful, it has to first prove its usefulness to average people, market realities state that the market potential and successful advertising of a product determines its future as a return-generating instrument. Contents hide 1 Cryptocurrency Industry’s Overview 1.1 The Appeal and Use Cases of Cryptocurrencies 1.2 Challenges and Concerns 1.3 The Rise of DeFi 2 Looking Back at Past Perceptions 3 Cryptocurrency Market Overview May 2023 3.1 Bitcoin Sees Bullish Trend Amidst Banking Crisis and Regulatory Crackdown 4 What to expect in the future 4.1 1. Regulatory Showdown: Cryptocurrency Battles Reach a Tipping Point 4.2 2. Technological Advancements 4.3 3. Increasing Adoption: 4.4 4. Bitcoin’s Performance in Relation to the S&P 500: A Risk-On…

    Article 2023年6月3日
  • Best Twitter threads of the day – August 3rd

    Description Is it censorship for Uniswap to delist tokens? Lazarus Group links stolen funds from the Harmony, Atomic Wallet, and Coinspaid/Alphapo hacks together on-chain Hong Kong debuts retail Crypto trading with HashKey and OSL Is it censorship for Uniswap to delist tokens? A bunch of y’all didn’t like this tweet. “Censorship!!” “Centralization!” Let’s unpack… Uniswap is two things: 1) a web interface and 2) a decentralized protocol (the DEX) The interface is run by a centralized company in Brooklyn. The DEX is decentralized/permissionless 1/ https://t.co/XcYInWgEdz — Erik Voorhees (@ErikVoorhees) August 2, 2023 The centralized web interface has delisted multiple assets (most recently, HEX). The decentralized protocol, however, has not. You can still buy HEX on the protocol (but you shouldn’t because it’s retarded) Is it “censorship” for the central company to remove from web UI? 2/ — Erik Voorhees (@ErikVoorhees) August 2, 2023 I’d call it having standards. If I run a store, I’m not going to sell scam products. Indeed, when I ran ShapeShift, we delisted BSV because in our opinion, it was built on fraud (specifically, the fraudulent…

    Article 2023年8月4日
  • Prime Trust faces customer withdrawal issues – Nevada regulator raises concerns

    TL;DR Breakdown Prime Trust, a prominent financial services business, is having problems fulfilling customer withdrawal requests. Prime Trust customers have been shocked by the announcement of its withdrawal issues Prime Trust’s financial status has “considerably deteriorated,” making it “unsafe or unsound” to conduct business, according to Nevada’s Department of Business and Industry’s June 21 cease and desist order. Description Prime Trust, a reputable financial services provider, has had trouble satisfying customer withdrawal requests recently. The reason for these distill being determined is unknown. However, sources say the Nevada regulator’s action suggests underlying worries about Prime Trust’s financial stability and liquidity. The FID, which supervises state-regulated trust organizations, discovered that Prime Trust has been running … Read more Prime Trust, a reputable financial services provider, has had trouble satisfying customer withdrawal requests recently. The reason for these distill being determined is unknown. However, sources say the Nevada regulator’s action suggests underlying worries about Prime Trust’s financial stability and liquidity. The FID, which supervises state-regulated trust organizations, discovered that Prime Trust has been running a significant deficit and might even be insolvent….

    Article 2023年6月26日
TOP