• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Latest Cybersecurity News Windows security

Microsoft customer support breached by Nobelium hackers

William Marshal Posted On June 27, 2021
0



Nobelium hackers attack

A Russian state-sponsored group called Nobelium has breached into Microsoft’s support agent computer and accessed customer subscription information. Nobelium hackers were the ones behind the SolarWinds supply-chain attacks. Microsoft mentioned in their blog post about the Nobelium hackers and their password spray attacks and brute-force attacks on their corporate network looking for a way to breach into Microsoft’s network.

The modus operandi of Nobelium hackers attack

Password Spray and Brute-force attacks use random passwords to guess the right one and breach into an account or network. While the former tries to use one password for multiple accounts to breach into the latter will attempt multiple passwords for a single account.

Nobelium Hackers
Nobelium Hackers phishing email

Microsoft claims that Nobelium hackers’ attack attempts weren’t completely successful as they could only breach some entities that includes IT companies, financial institutions, government and non-government organizations that is scattered around 36 countries in total.

Nobelium hackers and the Microsoft support tools accessed

Nobelium hackers have gained access into customer support agent’s computer accessing the basic account information of a limited number of customers. After gaining access Nobelium hackers used these information to gain further access into the corporate network using targeted phishing attacks on Microsoft customers.

Reuters has received an email warning about the Microsoft’s Nobelium Hackers access into the corporate account.

Nobelium hackers and their latest routines

Nobelium hackers also go by other names like Cozy bear, The Dukes, and APT29, has been the ones behind the massive SolarWinds supply chain attack that hindered operations among major US organizations like FireEye, Cisco, Malwarebytes, Mimecast and more. Furthermore, Microsoft disclosed the hacking group had compromised the Constant Contact account for USAID (US agency for foreign aid and development assistance).

With the aid of this account, Nobelium conducted numerous spear phishing attacks to deploy malware and gain access to many corporate networks. However, later US DOJ (Department of Justice) has seized the domains to prevent phishing and malware distributions.

Share the article with your friends


Nobelium cyber criminalsNobelium Hacker groupNobelium hackersNobelium State Sponsored Hackers


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Recast Software: Advanced Endpoint Management and Security...
      November 16, 2024
    • Patch My PC: Streamlined Software Management for ConfigMgr...
      November 9, 2024
    • Best Microsoft Intune Alternatives: Top 5 MDMs to Consider
      November 4, 2024
    • Top 11 Log Management Tools for Efficient System Management
      September 20, 2024
    • Top 5 Threat Intelligence Tools For 2024
      September 19, 2024


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search