China’s Storm-0558 hacked 25 organizations, including government agencies, using fake tokens for email access, aiming at espionage since May 15, 2023.
However, Storm-0558’s campaign was blocked by Microsoft without affecting other environments. Not only that even, Microsoft also acted promptly by notifying all the targeted customers to secure their systems.
Surprisingly, Microsoft remains unaware of how Chinese hackers acquired an inactive Microsoft account signing key to breach Exchange Online and Azure AD accounts.
Since discovering the malicious campaign on June 16, 2023, Microsoft has accomplished the following things:-
While Microsoft affirmed that the way in which the threat actors obtained or gained access to the key is currently under investigation.
US government officials detected unauthorized access to multiple Exchange Online email services of government agencies, triggering the incident report.
Storm-0558, observed by Microsoft, primarily targets the following entities:-
Besides this, their primary objective is to get unauthorized email account access of targeted organizations’ employees.
It’s been discovered by Microsoft that through Outlook Web Access (OWA) Storm-0558 accessed customer Exchange Online data. Initially, it was believed that the actor stole Azure AD tokens using malware on infected devices.
Security researchers at Microsoft discovered that the threat actor forged Azure AD tokens using an acquired MSA consumer signing key, which is a validation error in Microsoft code that allowed this abuse.
The techniques that were used by threat actors during this incident are mentioned below:-
Moreover, to access the OWA Exchange Store service, Storm-0558 leverages:-
Through Tor or hardcoded SOCKS5 proxy servers, the web requests are sent, and for issuing requests the threat actor employs various User-Agents like:-
Sensitive data, including bearer access tokens and email information, is hardcoded in the scripts used by the threat actor to make OWA API calls. Additionally, for future OWA commands, the threat actor can refresh the access token.
Storm-0558 extensively utilized dedicated infrastructure with SoftEther proxy software, posing challenges for detection and attribution.
Microsoft Threat Intelligence successfully profiled this proxy infrastructure and correlated it with the actor’s intrusion techniques during their response.
An international ecosystem of sophisticated scam operations has emerged, targeting vulnerable populations through impersonation tactics…
TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage…
As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on…
The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with…
A sophisticated Python-based remote access trojan has emerged in the gaming community, disguising itself as…
The SideWinder advanced persistent threat group has emerged with a sophisticated new attack methodology that…