iTnews Asia
  • Home
  • News
  • Security

Crash log exposed Microsoft Outlook keys to threat actor

Crash log exposed Microsoft Outlook keys to threat actor

How July’s Storm-0558 attack happened.

By Richard Chirgwin on Sep 7, 2023 3:22PM

A security key written to a “crash dump” and then accessed by a compromised engineer account was the root cause of a Microsoft security exposure earlier this year.

In a detailed incident post-mortem, Microsoft said the errors resulted in Chinese threat actor Storm-0558 obtaining an MSA consumer key, allowing it to forge tokens for Outlook.com and Outlook Web Access (OWA).

With access to the Microsoft account consumer signing key, Storm-0558 was able to create consumer keys signed with a token that could also be accepted by enterprise systems.

Microsoft said it has updated its libraries to prevent this in the future.

Key material is not meant to leave Microsoft’s production environment, Microsoft said.

However, “a consumer signing system crash in April of 2021 resulted in a snapshot of the crashed process (“crash dump”). 

“The crash dumps, which redact sensitive information, should not include the signing key," Microsoft wrote.

“In this case, a race condition allowed the key to be present in the crash dump," the vendor said, adding the issue "has been corrected".

Furthermore, Microsoft’s systems didn’t detect the presence of the key material in the crash dump, an issue which the company said has also been fixed.

The crash dump “was subsequently moved from the isolated production network into our debugging environment on the internet connected corporate network."

“This is consistent with our standard debugging processes. Our credential scanning methods did not detect its presence (this issue has been corrected),” the post-mortem states.

Microsoft hasn’t been able to determine exactly how the Storm-0558 actor gained access to the key, but believes it was via a compromised Microsoft engineer’s corporate account, which had access to the debugging environment containing the crash dump.

The company also said it has resolved how the race condition allowed the signing key to be part of the crash dump.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
microsoft msa outlook owa security

Related Articles

  • Ransomware gang Qilin claims attack on Japan’s Asahi breweries
  • IMDA and Enterprise Singapore launch SME-focused cybersecurity initiative
  • Cyberthreats are now targeting critical infrastructure on a larger scale
  • Gemini vulnerabilities threaten potential exposure of user data
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

IMDA and Enterprise Singapore launch SME-focused cybersecurity initiative

IMDA and Enterprise Singapore launch SME-focused cybersecurity initiative

Cyberthreats are now targeting critical infrastructure on a larger scale

Cyberthreats are now targeting critical infrastructure on a larger scale

Ransomware gang Qilin claims attack on Japan’s Asahi breweries

Ransomware gang Qilin claims attack on Japan’s Asahi breweries

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.