Jon Styf , Abraham Jewett  |  March 15, 2024

Category: Data Breach
Close up of Microsoft signage, representing the Microsoft data breach.
(Photo Credit: MAXSHOT.PL/Shutterstock)

Update: 

  • Microsoft says it is still trying to remove Russian state-sponsored hackers from email accounts belonging to some of the company’s senior executives, The Associated press reports
  • The company states the hackers, who are from Russia’s foreign intelligence service, stole secrets from email communications between itself and unspecified customers. 
  • The hackers initially breached corporate email accounts belonging to certain Microsoft senior leadership, cybersecurity and legal team members in November. 
  • Microsoft first announced the incident in January, saying at that time it had mitigated a cyberattack from the hacking group Midnight Blizzard, also known as Nobelium. 
  • The company attributed the incident to a password spray attack it says compromised “a legacy non-production test tenant account and gained a foothold.” 

Microsoft data breach overview: 

  • Who: Microsoft announced it detected and mitigated a cyberattack from Russian state-sponsored hacker Midnight Blizzard, otherwise known as Nobelium.
  • Why: In November, the group obtained access to some Microsoft corporate email accounts, including Microsoft senior leadership and cybersecurity and legal team members.
  • Where: The Microsoft data breach compromised U.S.-based servers and employees.

(Jan 23, 2024)

On Jan. 12, Microsoft identified a cyberattack from a Russian state-sponsored group that gained access to the email accounts of some Microsoft employees, including senior leadership, cybersecurity and legal team members.

The group, named Midnight Blizzard, accessed the accounts following a password spray attack in November 2023 that compromised “a legacy non-production test tenant account and gained a foothold,” Microsoft says in a blog post.

Midnight Blizzard accessed the account’s permissions to some of Microsoft’s corporate email accounts. It then exfiltrated emails and obtained their attached documents, Microsoft says.

The company says it is in the process of notifying Microsoft employees who were part of the Microsoft data breach.

“The attack was not the result of a vulnerability in Microsoft products or services,” the Microsoft blog post states. “To date, there is no evidence that the threat actor had any access to customer environments, production systems, source code or AI systems. We will notify customers if any action is required.”

Microsoft makes attack public due to transparency commitment

Microsoft says it made the Midnight Blizzard attack public because it committed to transparency in its Secure Future Initiative.

“Given the reality of threat actors that are resourced and funded by nation states, we are shifting the balance we need to strike between security and business risk — the traditional sort of calculus is simply no longer sufficient,” the company says in the blog post. “For Microsoft, this incident has highlighted the urgent need to move even faster. We will act immediately to apply our current security standards to Microsoft-owned legacy systems and internal business processes, even when these changes might cause disruption to existing business processes.”  

The internal investigation into the Microsoft data breach indicates Midnight Blizzard, also known as Nobelium, initially accessed the Microsoft employees’ emails to search for information on itself, Microsoft says. It adds the cyberattack shows the continued risk of well-funded hackers such as Midnight Blizzard.

In October 2022, Microsoft publicly disclosed a misconfigured internet-accessible Microsoft server exposed sensitive customer information. 

Has your information ever been compromised in a cyberattack? Let us know in the comments.


Don’t Miss Out!

Check out our list of Class Action Lawsuits and Class Action Settlements you may qualify to join!


Read About More Class Action Lawsuits & Class Action Settlements:

We tell you about cash you can claim EVERY WEEK! Sign up for our free newsletter.

40 thoughts onRussian data breach of Microsoft continues

  1. Debora M says:

    My laptop got hacked last month and the warning said its from microsoft security. My husband called the number provided and they kept pushing him to give our bank account information. I told my husband its hacked and hanged up the call. Its scary.

  2. ronnee says:

    I logged into my Microsoft and I see where I have had 48 hacks to my email. How am I supposed to trust this app when my information is always stolen please add me

  3. MARY PURKERSON says:

    I logged into my Microsoft account and checked security notifications and have at least 20 plus attempted logins from several countries to include : Croatia, China, Germany, Poland, USA, and Columbia. All unsuccessful, however my information was leaked and I can change my password all day everyday, but I’m not willing to uproot my whole email address just because of a data breach that should of never happened. My concern is since they have my email address when will they stop trying to hack my account. They have literally attempted to hack my account almost everyday in February, some displayed IP addresses and some displayed a DNS address. I have all the attempts backed up on a file with location info. Microsoft Cyber Security needs to be replaced if they can’t prevent a simple attack. The hackers literally left calling cards. Our info has already been sold on the black web. WHAT I want to know is what is Microsoft going to do about it? I m not accepting no stupid credit reporting freebie subscription. I want a full scrub of all my accounts from the black web. FYI: For those affected by this like myself, this should be your request as well, because they can offer credit monitoring subscription. In all actuality that doesn’t help with removing your information that’s already been bought and sold over and over on the black web. We will not deactivate accounts, or change passwords daily. It will not benefit anyone. This is unacceptable!! Hackers, robot, advanced AI repetitive password software can’t hack my account, that means this was a very low level data breach that could of very well been prevented!!!!

  4. Walter Jones Jr says:

    ADD ME

  5. Amber Nicole Walker says:

    I dont know if it has anything to do with the 50 attempts to log in from russia china and many other countries into my Dropbox but seems odd timing

  6. Shanita Green says:

    Getting scam emails stating that I have purchased a subscription and I didn’t.

  7. Teresa Webb says:

    I have used drop box for a few years now. Add me please.

  8. Joe Ezell says:

    Please add me

  9. Christopher Valdez says:

    Ive had a multiple cases of identity theft and data breach since I’ve used Microsoft for my business in 2020 and till now.

  10. Terri says:

    Getting messages and it a scammer wrong number to call

1 2 3 4

Leave a Reply

Your email address will not be published. By submitting your comment and contact information, you agree to receive marketing emails from Top Class Actions regarding this and/or similar lawsuits or settlements, and/or to be contacted by an attorney or law firm to discuss the details of your potential case at no charge to you if you qualify. Required fields are marked *

Please note: Top Class Actions is not a settlement administrator or law firm. Top Class Actions is a legal news source that reports on class action lawsuits, class action settlements, drug injury lawsuits and product liability lawsuits. Top Class Actions does not process claims and we cannot advise you on the status of any class action settlement claim. You must contact the settlement administrator or your attorney for any updates regarding your claim status, claim form or questions about when payments are expected to be mailed out.