Microsoft's exposed gaping wounds in its own cyber security armor, admit that a Russia-aligned threat actor, identified as Midnight Blizzard successfully stole emails from key members of its senior leadership team, as well as employees on its cyber security and legal teams.
However, the real bombshell lies not in the attribution of the attack but Microsoft's own startling admission of its woefully inadequate security measures.
Microsoft's pinning the blame on Russia for the breach may serve as a convenient smokescreen, obscuring their own lapses in safeguarding sensitive information.
The common thread linking Microsoft and the 2020 SolarWinds breach is not just geopolitical intrigue; it is the stark vulnerability of both to DNS tampering and abuse that Microsoft manage.
Both Microsoft and SolarWinds rely on Microsoft Servers, and both have been, and evidently remain, exposed to the perils of DNS tampering.
It is disconcerting, if not outright alarming, that a significant percentage of cyber-attacked companies find themselves ensnared in Microsoft's web.
The disclosure that Microsoft's own executives and cyber security teams fell victim to email ex-filtration sends klaxons echoing not only within the company's Redmond headquarters but should resonate as a chilling wake-up call for every Microsoft client worldwide including Governments and Military.
The heart of the matter lies in Microsoft's startling inability to control or manage the security of its DNS records and servers despite issuing CVE-2020-1350 with a CVSS of 10 (critical). In an era where digital threats loom large, such a fundamental lapse in cyber security is nothing short of a dereliction of duty on Microsoft's part.
The very foundation of the digital fortress that millions of organizations entrust is crumbling, exposing a vast array of critical data to malicious actors.
Microsoft's rush to attribute the breach to Russia conveniently deflects attention from its own systemic failures. Instead of acknowledging its shortcomings and fortifying its defenses, Microsoft seems content to point its fingers and lay blame elsewhere.
This is not just a breach; it is a damning indictment of a tech giant that, despite its prominence, has fallen woefully short in securing its own house.
Every Microsoft client is unwittingly caught in the crossfire, grappling with the consequences of a provider that has failed to uphold the basic tenets of cyber security. It is high time for Microsoft and its clients to recognize the urgent need for a robust and impregnable security infrastructure, free from the specter of DNS vulnerabilities.
Whilst blaming Russia may provide a convenient narrative, the real villain in this saga is the company entrusted with safeguarding digital fortresses but seemingly unable to fortify its own.
Satya Nadella Brad Smith Tom Burt Ann Johnson
#WhitethornShield
#Microsoft
#CISA
#NSA
#GCHQ