this post was submitted on 07 Sep 2023
179 points (100.0% liked)

Technology

59152 readers
2539 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Microsoft finally explains cause of Azure breach: An engineer’s account was hacked::Other failures along the way included a signing key improperly appearing in a crash dump.

top 10 comments
sorted by: hot top controversial new old
[–] [email protected] 38 points 1 year ago (5 children)

Man, I'd hate to be that guy.

I wonder if there are repercussions for them? Like, eventually corporate hacking is going to be so sophisticated that even the most tech savvy will be vulnerable.

[–] [email protected] 22 points 1 year ago* (last edited 1 year ago) (1 children)

Successful credential theft can really never be blamed on a single individual unless it can be proved to be malice. It's always a systemic failure, even in cases where the user didn't follow a process because of X. The issue was the X in the process and another user would have done the same thing eventually.

And in this case we're talking about technologically savvy person, an engineer (systems or software idk)

[–] [email protected] 3 points 1 year ago (1 children)

Well.. we can't always assume the engineers are technologically savvy, I've met some pretty bad ones.

[–] [email protected] 2 points 1 year ago

Okay I'm just assuming the best from humanity. Probably shouldn't always

[–] [email protected] 7 points 1 year ago (1 children)

Why would corporate hacking get sophisticated when the most efficient way to get access is still a simple phishing email?

[–] [email protected] 4 points 1 year ago

The human is always the weakest cog in the machine... just wait until we're all replaced.

[–] [email protected] 4 points 1 year ago

Ideally your company follows the swiss cheese model of incidents. It's not the people, but the processes in place that brought us there.

The only company I worked where that model didn't follow was run by a moron who micromanaged, blamed people and was a Big fucking baby. That company went bankrupt after 3 years.

[–] [email protected] 2 points 1 year ago

Probably only if he was found to be grossly negligent. Otherwise, it’s really more of a methodology/procedural failing on the company’s part

[–] [email protected] 1 points 1 year ago

even the most tech savvy will be vulnerable.

*are

[–] [email protected] 10 points 1 year ago

This is the best summary I could come up with:


Such keys, Microsoft said, are entrusted only to employees who have undergone a background check and then only when they are using dedicated workstations protected by multi-factor authentication using hardware token devices.

To safeguard this dedicated environment, email, conferencing, web research, and other collaboration tools aren’t allowed because they provide the most common vectors for successful malware and phishing attacks.

The hack of a Microsoft engineer’s corporate account allowed Storm-0558 to access the crash dump and, with it, the expired Exchange signing key.

Addressing the second mystery, the post explained how an expired signing key for a consumer account was used to forge tokens for sensitive enterprise offerings.

Human errors prevented a programming interface designed to cryptographically validate which environment a key from working properly.

Thus, the mail system would accept a request for enterprise email using a security token signed with the consumer key (this issue has been corrected using the updated libraries).


The original article contains 734 words, the summary contains 154 words. Saved 79%. I'm a bot and I'm open source!