Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Elgato is launching a bigger teleprompter for presenters, podcasters, and businesses

    October 9, 2025

    Inside Intel’s Hail Mary to Reclaim Chip Dominance

    October 9, 2025

    The best October Prime Day deals you can still shop

    October 9, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight
    Security

    Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight

    News RoomBy News RoomJanuary 27, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Microsoft and Hewlett-Packard Enterprise (HPE) both recently disclosed that they suffered corporate email breaches at the hands of Russia’s “Midnight Blizzard” hackers.

    The group, which is tied to the Kremlin’s SVR foreign intelligence, is specifically linked to SVR’s APT 29 Cozy Bear, the gang that meddled in the United States 2016 presidential election, has conducted aggressive government and corporate espionage around the world for years, and was behind the infamous 2021 SolarWinds supply chain attack. While both HP’s and Microsoft’s breaches came to light within days of each other, the situation mainly illustrates the ongoing reality of Midnight Blizzard’s international espionage activities and the lengths it will go to to find weaknesses in organizations’ digital defenses.

    “We shouldn’t be surprised that Russian intelligence-backed threat actors, and SVR in particular, are targeting tech companies like Microsoft and HPE. With organizations that size, it would be a much bigger surprise to learn they weren’t,” says Jake Williams, a former US National Security Agency hacker and current faculty member at the Institute for Applied Network Security.

    HP Enterprise said in a US Securities and Exchange Commission submission posted on Wednesday that Midnight Blizzard gained access to its “cloud-based email environment” last year. The company first learned about the situation on December 12, 2023, but said that the attack began in May 2023. Hackers “accessed and exfiltrated data … from a small percentage of HPE mailboxes belonging to individuals in our cybersecurity, go-to-market, business segments, and other functions,” the company wrote in the SEC filing. HP Enterprise said the breach likely came about as the result of another incident, discovered in June 2023, in which Midnight Blizzard also accessed and exfiltrated company “SharePoint” files beginning as early as May 2023. SharePoint is a much-targeted cloud collaboration platform made by Microsoft that integrates with Microsoft 365.

    “The accessed data is limited to information contained in the HPE users’ email boxes,” HP Enterprise spokesperson Adam Bauer told WIRED in a statement. “We continue to investigate and analyze these mailboxes to identify information that could have been accessed and will make appropriate notifications as required.”

    Meanwhile, Microsoft said on Friday that it detected a system intrusion on January 12 tied to a November 2023 breach. The attackers targeted and compromised some historic Microsoft system test accounts that then allowed them to access “a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions.” From there the group was able to exfiltrate “some emails and attached documents.” Microsoft noted in its disclosure that the attackers appeared to be seeking information about Microsoft’s investigations and knowledge of Midnight Blizzard itself.

    “The attack was not the result of a vulnerability in Microsoft products or services. To date, there is no evidence that the threat actor had any access to customer environments, production systems, source code, or AI systems,” the company wrote in its disclosure. “This attack does highlight the continued risk posed to all organizations from well-resourced nation-state threat actors like Midnight Blizzard.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleScientists Will Test a Cancer-Hunting mRNA Treatment
    Next Article This MIDI guitar is my favorite new way to make music

    Related Posts

    Google’s Latest AI Ransomware Defense Only Goes So Far

    October 6, 2025

    Where Do Your Passwords Go When You Die?

    October 4, 2025

    DHS Has Been Collecting US Citizens’ DNA for Years

    September 30, 2025

    ‘SIM Farms’ Are a Spam Plague. A Giant One in New York Threatened US Infrastructure, Feds Say

    September 30, 2025

    Russia Tests Hypersonic Missile at NATO’s Doorstep—and Shares the Video

    September 29, 2025

    Heritage Foundation Uses Bogus Stat to Push a Trans Terrorism Classification

    September 29, 2025
    Our Picks

    Inside Intel’s Hail Mary to Reclaim Chip Dominance

    October 9, 2025

    The best October Prime Day deals you can still shop

    October 9, 2025

    OneDrive is getting a new Windows app and an AI photo agent

    October 9, 2025

    Google’s Pixel 10 Pro Fold is the thin-enough foldable

    October 9, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    The Meta Ray-Ban Display’s most interesting tech might be the glass

    By News RoomOctober 9, 2025

    iFixit has broken down Meta’s Ray-Ban Display glasses, revealing that the tech inside isn’t what…

    You don’t have much longer to save on 4K Blu-rays during October Prime Day

    October 9, 2025

    Sony’s noise-canceling WH-1000XM5 headphones are a Prime Day steal at $150 off

    October 8, 2025

    This Startup Wants to Spark a US DeepSeek Moment

    October 8, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.