The Other Side Of The Firewall

Russian Hackers Breach Microsoft


Listen Later

In this episode, Ryan and Shannon discuss the recent theft of Microsoft's source code by Russian government hackers. They highlight the use of password spraying and the lack of lockouts as a vulnerability that allowed the attack to occur. They also emphasize Microsoft's global presence and the potential impact of the breach on various countries and organizations. The delayed detection of the attack raises concerns about Microsoft's security measures. The conversation explores the ongoing investigation and the need for more information. Lessons learned from the incident and the potential future threats are discussed, including the importance of access control and privileged accounts.


Takeaways


Password spraying and the lack of lockouts can leave organizations vulnerable to attacks.

Microsoft's global presence makes it a prime target for hackers.

Delayed detection of attacks can have serious consequences.

Access control and privileged accounts should be carefully managed to prevent unauthorized access.


Article: Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails

https://www.securityweek.com/microsoft-says-russian-gov-hackers-stole-source-code-after-spying-on-executive-emails/?fbclid=IwAR3Tt7ypxIK2ZxFSk3MaXBz0Ydj0-co1AP09NA8ze1JmK85lscfA38EtKXc


Socials:

Website - https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/

Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181

Instagram (IG) - https://www.instagram.com/theothersideofthefw/

X (Twitter) - https://twitter.com/Ask_a_CISSP

YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw

Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy

Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/


Chapters


00:00 Introduction

00:35 Microsoft's Source Code Theft

02:28 Microsoft's Global Presence

03:28 Delayed Detection of the Attack

04:24 Microsoft's Vulnerability and Targeted Attacks

05:30 Incomplete Information and Ongoing Investigation

06:28 Lessons Learned and Future Threats

07:06 Access Control and Privileged Accounts

07:39 Legacy Accounts and Identity Access Management

08:04 Expectations and Follow-up

08:55 Call to Action


#cybersecurity #microsoft #russia

...more
View all episodesView all episodes
Download on the App Store

The Other Side Of The FirewallBy Ryan Williams