Storm-0558

Threat Actor updated 5 months ago (2024-05-04T21:18:03.683Z)
Download STIX
Preview STIX
Storm-0558, a threat actor believed to be operating on behalf of the Chinese government, has been identified by Microsoft as the group responsible for a significant breach involving customer email accounts. The attack was initiated through Outlook Web Access in Exchange Online and Outlook.com, with the attackers leveraging forged authentication tokens to gain access. The investigation into this malicious activity began on June 16 after Microsoft received reports of unusual mail activity. This China-based threat actor is known for its sophisticated methods, including the use of custom malware like Cigril and Bling for espionage purposes. The impact of Storm-0558's activities is far-reaching, affecting approximately 25 organizations, which include U.S. defense industrial base entities (Circle Typhoon / DEV-0322, Mulberry Typhoon / Manganese, and Volt Typhoon / DEV-0391), U.S. critical infrastructure, and government bodies in Europe, the U.S., and Taiwan (Charcoal Typhoon / Chromium and Flax Typhoon / Storm-0919). In one notable incident, the group reportedly accessed the email account of the United States ambassador to China, compromising hundreds of thousands of individual U.S. government emails. In September, Microsoft revealed that Storm-0558 had stolen around 60,000 emails and found additional vulnerabilities that allowed the group to compromise the cloud accounts of U.S. officials. This persistent threat from Storm-0558 underscores the need for robust cybersecurity measures, particularly for high-value targets such as government agencies and critical infrastructure. With state-sponsored actors like Storm-0558 posing significant threats, organizations must remain vigilant and proactive in their cybersecurity efforts.
Description last updated: 2024-05-04T20:57:10.942Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Espionage
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.