Storm-0558 Overview:
Significant Incident - July 2023:
Consequences and Recommendations:
Current Status:
Organizational vigilance, regular security updates, and adherence to best practices in credential management and network isolation are critical measures emphasized to prevent similar threats in the future.
Storm-0558 Overview:
Significant Incident - July 2023:
Consequences and Recommendations:
Current Status:
Organizational vigilance, regular security updates, and adherence to best practices in credential management and network isolation are critical measures emphasized to prevent similar threats in the future.
| IOC | Judge | Tags |
|---|---|---|
| outlook.com | Benign | Trusted |
Mar 20, 2024 ... Storm-0558 is a China-based threat actor with espionage objectives. While there are some minimal overlaps with other Chinese groups such as ...
Sep 6, 2023 ... Based on the events described above, Microsoft has concluded that the most likely method by which Storm-0558 acquired the MSA signing key was ...
Jul 14, 2023 ... Microsoft Threat Intelligence assesses with moderate confidence that Storm-0558 is a China-based threat actor with activities and methods ...
Sep 7, 2023 ... Storm-0558 is a China-originated attack against sensitive Exchange Online mailboxes. The attack exposed several flaws in Microsoft's ...
Jul 11, 2023 ... 2023-07-13 – Added links to additional threat intelligence defenders can use as well as links for updated validation libraries for customers.
Sep 18, 2023 ... Shelter from the storm – lessons learned from the Storm-0558 Microsoft email attacks · Bad actors may already lurk in your network · Targeted ...
Dec 14, 2023 ... Microsoft attributed the attack to a threat actor group it tracks as Storm-0558, which it assesses conducts espionage on behalf of the People's ...
Sep 7, 2023 ... The threat actors used a stolen Microsoft account (MSA) consumer signing key to forge authentication tokens for Outlook Web Access and Outlook.
Sep 6, 2023 ... On July 11, 2023, Microsoft published the results of our preliminary investigation into activity by the threat actor group Storm-0558, a threat actor operating ...
Apr 2, 2024 ... The CSRB's review found that the intrusion by Storm-0558, a hacking group assessed to be affiliated with the People's Republic of China, was ...
Mar 20, 2024 ... Storm-0558 is a China-based threat actor with espionage objectives. While there are some minimal overlaps with other Chinese groups such as ...
Sep 6, 2023 ... Based on the events described above, Microsoft has concluded that the most likely method by which Storm-0558 acquired the MSA signing key was ...
Jul 14, 2023 ... Microsoft Threat Intelligence assesses with moderate confidence that Storm-0558 is a China-based threat actor with activities and methods ...
Sep 7, 2023 ... Storm-0558 is a China-originated attack against sensitive Exchange Online mailboxes. The attack exposed several flaws in Microsoft's ...
Jul 11, 2023 ... 2023-07-13 – Added links to additional threat intelligence defenders can use as well as links for updated validation libraries for customers.
The Storm-0558 attacks have been surrounded by significant controversies, primarily focusing on Microsoft's handling of the breach, communication with stakeholders, and the security culture within the company. Key points of controversy include:
Delayed and Incomplete Disclosure:
Security Oversights:
Corporate Culture and Practices:
Coordination with Government Agencies:
China's Role and Espionage:
These controversies underscore the complex challenges in cybersecurity, accountability, and the need for robust preventive measures in the face of sophisticated nation-state actors. Microsoft's response and the ongoing scrutiny aim to strengthen both corporate and national cybersecurity resilience.
The Storm-0558 attacks have been surrounded by significant controversies, primarily focusing on Microsoft's handling of the breach, communication with stakeholders, and the security culture within the company. Key points of controversy include:
Delayed and Incomplete Disclosure:
Security Oversights:
Corporate Culture and Practices:
Coordination with Government Agencies:
China's Role and Espionage:
These controversies underscore the complex challenges in cybersecurity, accountability, and the need for robust preventive measures in the face of sophisticated nation-state actors. Microsoft's response and the ongoing scrutiny aim to strengthen both corporate and national cybersecurity resilience.
Sep 7, 2023 ... Last month, the Department of Homeland Security (DHS) announced the Cyber Safety Review Board had initiated a broad review of cloud security ...
Sep 7, 2023 ... That's a pretty good way to frame the discussion: There were five separate holes in the cheese that the attackers chained together to mount the ...
May 21, 2024 ... ... cyber intrusion by threat actors affiliated with the People's Republic of China (PRC). The group, known as Storm-0558, successfully ...
Sep 18, 2023 ... Shelter from the storm – lessons learned from the Storm-0558 Microsoft email attacks ... impact or reasonably likely material impact on the ...
Jun 17, 2024 ... ... Cyber Safety Review Board's (CSRB) report on the Microsoft Online Exchange 2023 cyber intrusion by Storm-0558 ... problems, so I would ...
Apr 5, 2024 ... ... Storm-0558, urges security reforms following espionage incident. The U.S. Department of Homeland Security's Cyber Safety Review Board (CSRB) ...
Jun 13, 2024 ... ... Cyber Safety Review Board (“CSRB”) report. The report attributed last summer's Microsoft Exchange Online hack, by Storm-0558, which is ...
Jul 11, 2023 ... Cyberattacks continue to rise in sophistication and frequency ... Storm-0558's intrusion attempts. We've mitigated the attack and have ...
Jul 14, 2023 ... Deeper analysis of Storm-0558 techniques for obtaining unauthorized access to email data, tools, and unique infrastructure characteristics.
Jul 11, 2023 ... The actor exploited a token validation issue to impersonate Azure AD users and gain access to enterprise mail. We have no indications that Azure ...
Sep 7, 2023 ... Last month, the Department of Homeland Security (DHS) announced the Cyber Safety Review Board had initiated a broad review of cloud security ...
Sep 7, 2023 ... That's a pretty good way to frame the discussion: There were five separate holes in the cheese that the attackers chained together to mount the ...
May 21, 2024 ... ... cyber intrusion by threat actors affiliated with the People's Republic of China (PRC). The group, known as Storm-0558, successfully ...
Sep 18, 2023 ... Shelter from the storm – lessons learned from the Storm-0558 Microsoft email attacks ... impact or reasonably likely material impact on the ...
Jun 17, 2024 ... ... Cyber Safety Review Board's (CSRB) report on the Microsoft Online Exchange 2023 cyber intrusion by Storm-0558 ... problems, so I would ...
Storm-0558 operates as its own distinct group and, despite some minimal overlaps, is considered separate from other Chinese cyber groups. Here are the relevant details:
Thus, while Storm-0558 shares some characteristics and techniques with other groups like Violet Typhoon, it is recognized as a separate entity with specific objectives and activities 12.
Storm-0558 operates as its own distinct group and, despite some minimal overlaps, is considered separate from other Chinese cyber groups. Here are the relevant details:
Thus, while Storm-0558 shares some characteristics and techniques with other groups like Violet Typhoon, it is recognized as a separate entity with specific objectives and activities 12.
Apr 2, 2024 ... The CSRB's review found that the intrusion by Storm-0558, a hacking group assessed to be affiliated with the People's Republic of China, was ...
Mar 20, 2024 ... While there are some minimal overlaps with other Chinese groups such ... Storm-0558 operates as its own distinct group. Associated Families.
Apr 5, 2024 ... ... Storm-0558, a group associated with China. The exploitation ... Storm-0558 and associated groups. The Board is aware of Microsoft's ...
Jul 19, 2023 ... Storm-0558 is a China-based threat actor that has targeted European and US government entities as well as individuals politically aligned to Taiwan or Uyghur ...
Dec 14, 2023 ... Microsoft attributed the attack to a threat actor group it tracks as Storm-0558, which it assesses conducts espionage on behalf of the People's ...
Sep 6, 2023 ... ... threat actor group Storm-0558, a threat actor operating from China. On September 6, 2023, we announced that major technical investigations ...
Jul 14, 2023 ... While we have discovered some minimal overlaps with other Chinese groups such as Violet Typhoon (ZIRCONIUM, APT31), we maintain high confidence ...
Jul 11, 2023 ... The threat actor Microsoft links to this incident is an adversary based in China that Microsoft calls Storm-0558. We assess this adversary ...
Jul 11, 2023 ... Storm-0558 primarily targets government agencies in Western Europe and focuses on espionage, data theft, and credential access. Based on ...
Apr 2, 2024 ... The CSRB's review found that the intrusion by Storm-0558, a hacking group assessed to be affiliated with the People's Republic of China, was ...
Mar 20, 2024 ... While there are some minimal overlaps with other Chinese groups such ... Storm-0558 operates as its own distinct group. Associated Families.
Apr 5, 2024 ... ... Storm-0558, a group associated with China. The exploitation ... Storm-0558 and associated groups. The Board is aware of Microsoft's ...
Jul 19, 2023 ... Storm-0558 is a China-based threat actor that has targeted European and US government entities as well as individuals politically aligned to Taiwan or Uyghur ...
Dec 14, 2023 ... Microsoft attributed the attack to a threat actor group it tracks as Storm-0558, which it assesses conducts espionage on behalf of the People's ...
The Typhoon threat groups consist of multiple Advanced Persistent Threat (APT) entities generally attributed to China and linked to state-sponsored cyber espionage efforts. These groups have shown high levels of sophistication in targeting critical infrastructure, government agencies, and corporate sectors worldwide. Below is a comprehensive breakdown of the Typhoon threat groups, including key actors such as Salt Typhoon, Volt Typhoon, Flax Typhoon, Velvet Ant, and others.
Living-Off-The-Land Tactics (LOTL):
Typhoon groups avoid deploying conventional malware, instead relying on system utilities (e.g., PowerShell, WMIC, PsExec) to evade detection 16.
Exploitation of Vulnerabilities:
Target publicly known vulnerabilities, such as flaws in VPNs, IoT devices, firewalls, and mail servers 78.
Focus on Critical Infrastructure:
Groups like Salt Typhoon and Volt Typhoon often attack telecommunications, energy grids, and military communications systems 46.
The Typhoon groups' activities endanger national security, compromise critical infrastructure, expose private communications, and destabilize economic and energy networks 4. Their ability to operate stealthily and persist in systems highlights the urgent need for proactive defense strategies.
To counter threats posed by Typhoon groups:
By leveraging advanced techniques such as infrastructure intelligence and enhancing cross-sector collaboration, organizations can effectively mitigate risks posed by the Typhoon APT groups and remain resilient against their sophisticated attack methodologies.
The Typhoon threat groups consist of multiple Advanced Persistent Threat (APT) entities generally attributed to China and linked to state-sponsored cyber espionage efforts. These groups have shown high levels of sophistication in targeting critical infrastructure, government agencies, and corporate sectors worldwide. Below is a comprehensive breakdown of the Typhoon threat groups, including key actors such as Salt Typhoon, Volt Typhoon, Flax Typhoon, Velvet Ant, and others.
Living-Off-The-Land Tactics (LOTL):
Typhoon groups avoid deploying conventional malware, instead relying on system utilities (e.g., PowerShell, WMIC, PsExec) to evade detection 16.
Exploitation of Vulnerabilities:
Target publicly known vulnerabilities, such as flaws in VPNs, IoT devices, firewalls, and mail servers 78.
Focus on Critical Infrastructure:
Groups like Salt Typhoon and Volt Typhoon often attack telecommunications, energy grids, and military communications systems 46.
The Typhoon groups' activities endanger national security, compromise critical infrastructure, expose private communications, and destabilize economic and energy networks 4. Their ability to operate stealthily and persist in systems highlights the urgent need for proactive defense strategies.
To counter threats posed by Typhoon groups:
By leveraging advanced techniques such as infrastructure intelligence and enhancing cross-sector collaboration, organizations can effectively mitigate risks posed by the Typhoon APT groups and remain resilient against their sophisticated attack methodologies.
Mar 5, 2025 · Threat actors such as Salt Typhoon target critical data in their victims' networks. Being able to detect and audit historical data access is ...
Salt Typhoon is an advanced persistent threat actor believed to be operated by China's Ministry of State Security (MSS) which has conducted high-profile ...
Rating 4.8 (139) Feb 8, 2024 · Volt Typhoon (also known as BRONZE SILHOUETTE) is a People's Republic of China (PRC) state-sponsored APT group that focuses on stealthy and ...
Feb 11, 2025 · Threats to Critical Infrastructure and the Role of Infrastructure Intelligence. While cybersecurity has generally been top-of-mind, and many ...
5 days ago · Volt Typhoon is the PRC's state-sponsored cyber espionage group focused on disrupting U.S. critical infrastructure. Learn more in our guide.
Oct 24, 2024 · Among these are four major Advanced Persistent Threat (APT) groups: Volt Typhoon, Salt Typhoon, Flax Typhoon, and Velvet Ant.
Salt Typhoon's primary targets have been within the United States, Southeast Asia and various African countries, focusing on information theft and espionage.
Dec 18, 2024 · Armis examines Salt Typhoon, a sophisticated Chinese state-sponsored threat actor that has targeted U.S. telecom providers and political ...
The actor that Microsoft tracks as Volt Typhoon is a nation-state activity group based out of China. Volt Typhoon is known to primarily target the United ...
Mar 5, 2025 · Threat actors such as Salt Typhoon target critical data in their victims' networks. Being able to detect and audit historical data access is ...
Salt Typhoon is an advanced persistent threat actor believed to be operated by China's Ministry of State Security (MSS) which has conducted high-profile ...
Rating 4.8 (139) Feb 8, 2024 · Volt Typhoon (also known as BRONZE SILHOUETTE) is a People's Republic of China (PRC) state-sponsored APT group that focuses on stealthy and ...
Feb 11, 2025 · Threats to Critical Infrastructure and the Role of Infrastructure Intelligence. While cybersecurity has generally been top-of-mind, and many ...
5 days ago · Volt Typhoon is the PRC's state-sponsored cyber espionage group focused on disrupting U.S. critical infrastructure. Learn more in our guide.