Sept. 6, 2023, 7 a.m. |

Microsoft Security Response Center msrc-blog.microsoft.com

On July 11, 2023, Microsoft published a blog post which details how the China-Based threat actor, Storm-0558, used an acquired Microsoft account (MSA) consumer key to forge tokens to access OWA and Outlook.com. Upon identifying that the threat actor had acquired the consumer key, Microsoft performed a comprehensive technical investigation into the acquisition of the Microsoft account consumer signing key, including how it was used to access enterprise email.

access account acquisition actor blog blog post china consumer forge investigation investigations july key major microsoft outlook outlook.com owa results storm storm-0558 technical threat threat actor tokens

More from msrc-blog.microsoft.com / Microsoft Security Response Center

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Emergency Management Invoice Compliance Reviewer

@ AC Disaster Consulting | Denver, Colorado, United States - Remote

Threat Intelligence Librarian

@ Microsoft | Cheltenham, Gloucestershire, United Kingdom

Cyber Content Operations Manager - Remote in UK

@ Immersive Labs | United Kingdom

(Junior) Security Engineer (m/w/d)

@ CHECK24 | Berlin, Germany

Cyber Security

@ Necurity Solutions | Bengaluru, Karnataka, India