An attack that Microsoft ascribes to a “nation-state actor” successfully breached at least one executive branch email account, though the company said that the attempt at espionage has now been contained. Credit: Smederevac / Getty Images Microsoft has disclosed that that a cyberattack by a China-based “nation-state actor” managed to access email hosted on Exchange Online and Outlook.com belonging to about 25 organizations, including government agencies. Mitigation of the attack is complete, according to a statement from Microsoft, which blamed a threat actor tracked by the company as Storm-0558. That actor, based in China, "primarily targets government agencies in Western Europe and focuses on espionage, data theft, and credential access," according to the statement, issued Tuesday evening. The email accounts were compromised via a Microsoft account key, which was used to forge tokens for access to Outlook Web Access and Outlook.com. A token validation issue allowed Storm-0558 to "impersonate Azure AD users" in order to get access to the affected accounts, according to Microsoft. The company said that it has blocked the use of tokens created by the MSA key in question and replaced the key. "As with any observed nation-state actor activity, Microsoft has contacted all targeted or compromised organizations directly via their tenant admins and provided them with important information to help them investigate and respond," the company's statement said. "If you have not been contacted, our investigations indicate that you have not been impacted." Another statement, issued Wednesday by the US Cybersecurity and Infrastructure Security Agency and the FBI, said that at least one US federal civilian executive branch agency was compromised in the attack. The leak, which CISA and the FBI said was limited to unclassified data, was first observed in mid-June, when the affected agency observed an unusual application ID being used to access messages in email accounts. The government's statement said that similar attacks can be detected by enabling logging for the "mail items accessed" event in Microsoft 365's auditing system, and urged critical infrastructure organizations to ensure that that feature is turned on. CISA and the FBI also stated that potential targets for this type of attack should enable purview audit logging, ensure that log data can be searched by operators, and apply CISA's recommended baseline security configurations for Microsoft applications. (Full mitigation suggestions can be found here.) "Although these mitigations will not prevent this or related activity where actors leverage compromised consumer keys, they will reduce the impact of less sophisticated malicious activity targeting cloud environments," CISA and the FBI said. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe