this post was submitted on 28 Jan 2024
197 points (99.5% liked)

Technology

59589 readers
3394 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

In major gaffe, hacked Microsoft test account was assigned admin privileges — How does a legacy test account grant access to read every Office 365 account?::undefined

top 13 comments
sorted by: hot top controversial new old
[–] Untitled4774@sh.itjust.works 43 points 10 months ago (2 children)

How? Human error.

Why? Microsoft is just that kind of company and always has been. Their t’s aren’t crossed and i’s aren’t dotted, and people buy their shit because they’re used to it.

[–] SomeoneSomewhere@lemmy.nz 33 points 10 months ago

Boeing and Microsoft: same shit, different cloud.

[–] Redredme@lemmy.world 9 points 10 months ago (2 children)

Name one company which does. There aren't. Every corporation is big, cumbersome and full of people who make mistakes and don't follow procedures.

[–] rottingleaf@lemmy.zip 3 points 10 months ago

Every group of humans.

[–] Buddahriffic@lemmy.world 2 points 10 months ago

Which is why I don't trust "the cloud" in general. Obviously businesses are meant to make profit, not to protect my data. If one is at odds with the other, they will choose profit.

[–] rottingleaf@lemmy.zip 21 points 10 months ago (1 children)

I think this is a good example of a situation where it's appropriate to say "pwned".

[–] UsernameIsTooLon@lemmy.world 7 points 10 months ago (1 children)

Let's bring back leet speak while we're at it

[–] rottingleaf@lemmy.zip 3 points 10 months ago

I'm confident that my knowledge is not sufficiently sharp to use it, but the defiance of mainstream tech industry associated with it I just love.

[–] JJROKCZ@lemmy.world 19 points 10 months ago (1 children)

anyone that expected Microsoft to be faultless hasn’t paid attention to the last 30+ years

[–] Toribor@corndog.social 20 points 10 months ago (1 children)

Microsoft software may not be flawless, but at least it's expensive.

[–] cyberpunk007@lemmy.ca 2 points 10 months ago
[–] autotldr@lemmings.world 11 points 10 months ago

This is the best summary I could come up with:


The hackers who recently broke into Microsoft’s network and monitored top executives’ email for two months did so by gaining access to an aging test account with administrative privileges, a major gaffe on the company's part, a researcher said.

In Thursday’s post updating customers on findings from its ongoing investigation, Microsoft provided more details on how the hackers achieved this monumental escalation of access.

In Thursday’s update, Microsoft officials said as much, although in language that largely obscured the extent of the major blunder.

Threat actors like Midnight Blizzard compromise user accounts to create, modify, and grant high permissions to OAuth applications that they can misuse to hide malicious activity.

They created a new user account to grant consent in the Microsoft corporate environment to the actor controlled malicious OAuth applications.

The threat actor then used the legacy test OAuth application to grant them the Office 365 Exchange Online full_access_as_app role, which allows access to mailboxes.


The original article contains 339 words, the summary contains 156 words. Saved 54%. I'm a bot and I'm open source!

[–] where_am_i@sh.itjust.works 9 points 10 months ago* (last edited 10 months ago)

How? Easy: a result of lazy programing. Like every other MS vulnerability.

esit: Just remember, this is a company that designed a remote desktop protocol for their OS in a way that it could be exploited to remotely log in and take over control. You'd think, this was the exact type of threat that it should've been tested against.