False


Download Learnerz IAS app from the Play Store now! Download

$show=search/label/May%202022

 


Storm-0558 UPSC NOTE

SHARE:

  In July, Microsoft reported that a China-based hacking group named Storm-0558 had breached U.S. government-linked email accounts.  The at...

 

  • In July, Microsoft reported that a China-based hacking group named Storm-0558 had breached U.S. government-linked email accounts. 

  • The attack affected 25 organizations, including Western European government agencies and email accounts of top American officials.

  • The breach originated from the compromise of a Microsoft engineer's corporate account, allowing the hackers to extract a cryptographic key used to access email accounts.

  • Microsoft Threat Intelligence assessed Storm-0558 as a China-based threat actor engaged in espionage activities. 

  • The group operates independently, with working hours consistent with those in China.

  • Storm-0558 has historically targeted U.S. and European diplomatic, economic, and legislative bodies, as well as individuals associated with Taiwan and Uyghur geopolitical interests.

  • The group has been targeting Microsoft accounts since August 2021, using phishing campaigns and exploiting vulnerabilities in public-facing applications for initial access.

Breach of Microsoft's Security:

  • Storm-0558 compromised Microsoft's cloud security systems by acquiring an MSA key, which was used to forge tokens for access to Outlook Web Access (OWA), Microsoft's web-based mail client.

  • MSA keys are token signing keys used for authentication, and the acquired key was used to impersonate Azure AD users and gain access to enterprise email.

Cryptographic Key Explanation:

  • A cryptographic key is a character string used in encryption algorithms to encrypt and decrypt data. 

  • It ensures that data is secure and can only be accessed by those with the correct key.

  • There are two types of encryption: symmetric and asymmetric

  • Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys, with the private key kept secret.

COMMENTS

Name

Amritsar,1,April 2024,301,Art & Culture,11,August 2023,251,August 2024,400,Courses,7,Daily Current Affairs,51,December 2023,189,Disaster Management,2,Environment and Ecology,313,February 2024,228,Foundation Course,1,Free Class,1,GDP,1,GEMS Club,1,GEMS Plus,1,Geography,309,Govt Schemes,2,GS 2,1,GS1,56,GS2,432,GS3,271,GS4,1,GST,1,History,12,Home,3,IAS Booklist,1,Important News,71,Indian Economy,302,Indian History,23,Indian Polity,339,International Organisation,12,International Relations,246,Invasive Plant,1,January 2024,240,July 2023,281,July 2024,375,June 2022,6,June 2023,268,June 2024,324,March 2024,238,May 2022,17,May 2024,330,Mentorship,2,November 2023,169,November 2024,302,Novermber 2024,2,October 2023,203,October 2024,369,Places in News,2,Science & Technology,303,Science and Technology,119,September 2023,205,September 2024,336,UPSC CSE,115,UPSC Tips,4,
ltr
item
Learnerz IAS | Concept oriented UPSC Classes in Malayalam: Storm-0558 UPSC NOTE
Storm-0558 UPSC NOTE
https://lh4.googleusercontent.com/PphV9Pu6992DDnk_d9s2RHY1XIwW3WU6F2KdoH-21fc_flpG2PuiSLVSusXWrbM-04Gz3r2xtQcjdcqPsvnsm5fYGSPVR0ljx2g_eNs7aAY0BsS1sSkSGU8etvVbCmD8RvmbjI6L2hJtBvs=s2048
https://lh4.googleusercontent.com/PphV9Pu6992DDnk_d9s2RHY1XIwW3WU6F2KdoH-21fc_flpG2PuiSLVSusXWrbM-04Gz3r2xtQcjdcqPsvnsm5fYGSPVR0ljx2g_eNs7aAY0BsS1sSkSGU8etvVbCmD8RvmbjI6L2hJtBvs=s72-c
Learnerz IAS | Concept oriented UPSC Classes in Malayalam
https://www.learnerz.in/2023/09/storm-0558-upsc-note.html
https://www.learnerz.in/
https://www.learnerz.in/
https://www.learnerz.in/2023/09/storm-0558-upsc-note.html
true
4761292069385420868
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content