What do we know about the hack?
Microsoft executive Tom Burt revealed the breach in a blog post on Tuesday and announced updates to counter security flaws which he said had allowed hackers to gain access to Microsoft Exchange servers.
- Microsoft accuses China over email attacks
- Home working increases cyber-security fears
- Details released of Biden’s first call with Xi
The Microsoft Threat Intelligence Center (MSTIC) attributed the attacks with “high confidence” to a “state-sponsored threat actor” based in China which they named Hafnium.
The tech giant said Hafnium had tried to steal information from groups such as infectious disease researchers, law firms, higher education institutions and defence contractors.
A spokesman for the Chinese government told Reuters news agency that the country was not behind the hack. Beijing has repeatedly rejected US accusations of cyber-crime.
More than 20,000 organisations have been compromised in the US with many more affected worldwide, Reuters reported.
Brian Krebs, an industry expert and blogger, put the number higher – citing multiple security sources.
“At least 30,000 organizations across the United States – including a significant number of small businesses, towns, cities and local governments – have over the past few days been hacked by an unusually aggressive Chinese cyber-espionage unit that’s focused on stealing email from victim organizations,” he wrote in a blog post.
Mr Krebs warned attacks had “dramatically stepped up” since Microsoft’s announcement.
What is Microsoft doing?
News of the breach prompted the US Cybersecurity and Infrastructure Security Agency (Cisa) to release an emergency directive telling agencies and departments to take urgent action.
Jake Sullivan, the White House National Security Adviser, has also urged network owners to download the security patches as soon as possible.
Microsoft has not confirmed the reported figures but said in a further statement on Friday that it was working closely with US government agencies.
It told customers “the best protection” was “to apply updates as soon as possible across all impacted systems”.
However, it also said it was deploying some mitigation techniques designed to help those who are unable to upgrade quickly, but warned they were not “a remediation if your Exchange servers have already been compromised, nor are they full protection against attack”.
This is the eighth time in the past 12 months that Microsoft has publicly accused nation-state groups of targeting institutions critical to civil society.
Microsoft said the attack was in no way related to the SolarWinds attack, which hit US government agencies late last year.
Although Hafnium is based in China, it allegedly conducts its operations primarily from leased virtual private servers in the US, Microsoft said.