iTnews Asia
  • Home
  • News
  • Security

Crash log exposed Microsoft Outlook keys to threat actor

Crash log exposed Microsoft Outlook keys to threat actor

How July’s Storm-0558 attack happened.

By Richard Chirgwin on Sep 7, 2023 3:22PM

A security key written to a “crash dump” and then accessed by a compromised engineer account was the root cause of a Microsoft security exposure earlier this year.

In a detailed incident post-mortem, Microsoft said the errors resulted in Chinese threat actor Storm-0558 obtaining an MSA consumer key, allowing it to forge tokens for Outlook.com and Outlook Web Access (OWA).

With access to the Microsoft account consumer signing key, Storm-0558 was able to create consumer keys signed with a token that could also be accepted by enterprise systems.

Microsoft said it has updated its libraries to prevent this in the future.

Key material is not meant to leave Microsoft’s production environment, Microsoft said.

However, “a consumer signing system crash in April of 2021 resulted in a snapshot of the crashed process (“crash dump”). 

“The crash dumps, which redact sensitive information, should not include the signing key," Microsoft wrote.

“In this case, a race condition allowed the key to be present in the crash dump," the vendor said, adding the issue "has been corrected".

Furthermore, Microsoft’s systems didn’t detect the presence of the key material in the crash dump, an issue which the company said has also been fixed.

The crash dump “was subsequently moved from the isolated production network into our debugging environment on the internet connected corporate network."

“This is consistent with our standard debugging processes. Our credential scanning methods did not detect its presence (this issue has been corrected),” the post-mortem states.

Microsoft hasn’t been able to determine exactly how the Storm-0558 actor gained access to the key, but believes it was via a compromised Microsoft engineer’s corporate account, which had access to the debugging environment containing the crash dump.

The company also said it has resolved how the race condition allowed the signing key to be part of the crash dump.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
microsoft msa outlook owa security

Related Articles

  • Beware the pitfalls of using a ‘DIY security’ approach
  • AI transforms cyberattacks, but human trust remains the weakest link
  • How severe will ransomware attacks become in 2026?
  • Identity is now the new cybersecurity battlefield
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Beware the pitfalls of using a ‘DIY security’ approach

Beware the pitfalls of using a ‘DIY security’ approach

AI transforms cyberattacks, but human trust remains the weakest link

AI transforms cyberattacks, but human trust remains the weakest link

Zuellig Pharma launches Asia's first healthcare data exchange platform

Zuellig Pharma launches Asia's first healthcare data exchange platform

Toyota's Indian unit warns of a possible customer data breach

Toyota's Indian unit warns of a possible customer data breach

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.