{"id":4544,"date":"2024-03-11T06:03:19","date_gmt":"2024-03-11T06:03:19","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=4544"},"modified":"2024-03-11T07:40:07","modified_gmt":"2024-03-11T07:40:07","slug":"russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/","title":{"rendered":"Russian Hackers Target Microsoft, Stealing Source Code and Persistently Intruding"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<p><strong>Midnight Blizzard attack Microsoft &#8211; Russian Hackers Target Microsoft &#8211; Russian Hackers Attack Microsoft &#8211; Spying and try to Stealing Source Code &#8211;<\/strong> Microsoft <strong>on March 8<\/strong>, the tech giant issued a warning about the relentless efforts of Russian state sponsored hackers linked to the notorious group <a href=\"https:\/\/www.google.com\/search?q=Midnight+Blizzard\"><strong>Midnight Blizzard<\/strong><\/a>, also known as <strong>Nobelium<\/strong>. Microsoft is disclosing that the attack, from the same group behind the\u00a0<a href=\"https:\/\/www.google.com\/search?q=SolarWinds+attack\">SolarWinds attack<\/a>. The warning revealed that these hackers are persistently attempting to breach its systems, leveraging stolen data from corporate emails back in January.<\/p>\n<p>Microsoft emphasized the severity of the situation, expressing concerns about the safety of its systems and services. The attack, which started with the <a href=\"https:\/\/secry.me\/explore\/category\/cyber-security\/\">breach<\/a> in January, has evolved into an ongoing threat. The hackers, identified as Midnight Blizzard, are associated with Russia&#8217;s foreign intelligence and are notorious for targeting governments, diplomatic entities, and non-governmental organizations.<\/p>\n<p><strong>Russian Hackers Attack Microsoft &#8211;<\/strong> The initial breach involved attempts to access corporate email accounts, including those of senior company leaders and various functional departments such as cybersecurity and legal. Microsoft had already disclosed this breach earlier this year, stating that the hackers, through a dormant account, utilized a <em>&#8220;<a href=\"https:\/\/www.google.com\/search?q=%22password+spray%22+attack\">password spray<\/a>&#8220;<\/em> attack to gain unauthorized access. The recent development reveals that Midnight Blizzard has escalated its tactics, leading to the theft of source code repositories and internal systems.<\/p>\n<p><strong>Jerome Segura<\/strong>, <strong><em>Principal Threat Researcher at Malwarebytes&#8217; Threatdown Labs<\/em><\/strong>, expressed his concern, stating, <em>&#8220;That one of the largest software vendors is itself kind of learning things as they go is a little bit scary.&#8221;<\/em> This sentiment is shared among analysts who worry about the hackers&#8217; aggressiveness and Microsoft&#8217;s challenges in thwarting their access.<\/p>\n<p>The stolen data includes valuable access to Microsoft&#8217;s source code repositories and internal systems, posing a significant threat. The attackers aim to utilize these stolen &#8220;secrets&#8221; to infiltrate production environments, compromise software, and potentially insert backdoors. Microsoft has not disclosed specific affected customers but affirmed ongoing efforts to assist those impacted.<\/p>\n<p>Microsoft further revealed that the persistent attempts by Midnight Blizzard are a sign of a <em>&#8220;sustained, significant commitment of the threat actor\u2019s resources, coordination, and focus.&#8221;<\/em> Additionally, the company warned that the hackers are now attempting to use various &#8220;secrets&#8221; they have found to further breach Microsoft and potentially compromise its customers. Customers and Microsoft shared some of these secrets in emails.<\/p>\n<p>The ongoing situation underscores the challenges faced by large corporations in defending against evolving cyber threats. Microsoft remains committed to investigating and sharing findings on Midnight Blizzard&#8217;s activities, emphasizing the sustained and significant commitment of the threat actor&#8217;s resources, coordination, and focus. The company urges customers to stay vigilant and emphasizes the importance of implementing additional security measures to mitigate risks.<\/p>\n<p>This development comes just days after Microsoft announced its plan to overhaul its software security following serious Azure cloud attacks. Several high-profile security attacks have centered around Microsoft in recent years, including the hacking of 30,000 organizations&#8217; email servers in 2021 due to a Microsoft Exchange Server flaw and Chinese hackers breaching US government emails via a Microsoft cloud exploit last year.<\/p>\n<p>Despite Microsoft&#8217;s increased security investments and enhanced controls, the hackers continue their persistent efforts. The company reassures its customers that, to date, there is no evidence of compromise in Microsoft-hosted customer-facing systems. Active investigations into Midnight Blizzard&#8217;s activities are ongoing, and Microsoft remains committed to sharing updates on their findings.<\/p>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Midnight Blizzard attack Microsoft &#8211; Russian Hackers Target Microsoft &#8211; Russian Hackers Attack Microsoft &#8211; Spying and try to Stealing Source Code &#8211; Microsoft on March 8, the tech giant issued a warning about the relentless efforts of Russian state sponsored hackers linked to the notorious group Midnight Blizzard, also known as Nobelium. Microsoft is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4554,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194,131,180],"tags":[301,434,167,435,431,433,432],"class_list":{"0":"post-4544","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-news","9":"category-sensitive-data-exposure","10":"tag-data-breach","11":"tag-malwarebytes","12":"tag-microsoft","13":"tag-midnight-blizzard","14":"tag-russian-hacker","15":"tag-spying","16":"tag-spyware"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Russian Hackers Target Microsoft, Stealing Source Code and Persistently Intruding | SECRY<\/title>\n<meta name=\"description\" content=\"Russian Hackers Attack Microsoft - On March 8, the tech giant issued a warning about the relentless efforts of Russian state sponsored hackers linked to the notorious group Midnight Blizzard, also known as Nobelium.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Russian Hackers Target Microsoft, Stealing Source Code and Persistently Intruding | SECRY\" \/>\n<meta property=\"og:description\" content=\"Midnight Blizzard attack Microsoft - Russian Hackers Target Microsoft - Russian Hackers Attack Microsoft - Spying and try to Stealing Source Code -\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-11T06:03:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-11T07:40:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secryweb.sirv.com\/WP_secry.me\/2024\/03\/Russian-Hackers-Target-Microsoft.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/5c69c0bdd8490edfc08d16d35d727470\"},\"headline\":\"Russian Hackers Target Microsoft, Stealing Source Code and Persistently Intruding\",\"datePublished\":\"2024-03-11T06:03:19+00:00\",\"dateModified\":\"2024-03-11T07:40:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/\"},\"wordCount\":569,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Russian-Hackers-Target-Microsoft.png\",\"keywords\":[\"Data Breach\",\"Malwarebytes\",\"Microsoft\",\"Midnight Blizzard\",\"Russian Hacker\",\"Spying\",\"Spyware\"],\"articleSection\":[\"Cyber Security\",\"Hacker News\",\"Sensitive Data Exposure\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/\",\"name\":\"Russian Hackers Target Microsoft, Stealing Source Code and Persistently Intruding | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Russian-Hackers-Target-Microsoft.png\",\"datePublished\":\"2024-03-11T06:03:19+00:00\",\"dateModified\":\"2024-03-11T07:40:07+00:00\",\"description\":\"Russian Hackers Attack Microsoft - On March 8, the tech giant issued a warning about the relentless efforts of Russian state sponsored hackers linked to the notorious group Midnight Blizzard, also known as Nobelium.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Russian-Hackers-Target-Microsoft.png\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Russian-Hackers-Target-Microsoft.png\",\"width\":1280,\"height\":720,\"caption\":\"Russian Hackers Attack Microsoft\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Russian Hackers Target Microsoft, Stealing Source Code and Persistently Intruding\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/5c69c0bdd8490edfc08d16d35d727470\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Russian Hackers Target Microsoft, Stealing Source Code and Persistently Intruding | SECRY","description":"Russian Hackers Attack Microsoft - On March 8, the tech giant issued a warning about the relentless efforts of Russian state sponsored hackers linked to the notorious group Midnight Blizzard, also known as Nobelium.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/","og_locale":"en_US","og_type":"article","og_title":"Russian Hackers Target Microsoft, Stealing Source Code and Persistently Intruding | SECRY","og_description":"Midnight Blizzard attack Microsoft - Russian Hackers Target Microsoft - Russian Hackers Attack Microsoft - Spying and try to Stealing Source Code -","og_url":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2024-03-11T06:03:19+00:00","article_modified_time":"2024-03-11T07:40:07+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2024\/03\/Russian-Hackers-Target-Microsoft.png","type":"image\/png"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/5c69c0bdd8490edfc08d16d35d727470"},"headline":"Russian Hackers Target Microsoft, Stealing Source Code and Persistently Intruding","datePublished":"2024-03-11T06:03:19+00:00","dateModified":"2024-03-11T07:40:07+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/"},"wordCount":569,"commentCount":0,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/03\/Russian-Hackers-Target-Microsoft.png","keywords":["Data Breach","Malwarebytes","Microsoft","Midnight Blizzard","Russian Hacker","Spying","Spyware"],"articleSection":["Cyber Security","Hacker News","Sensitive Data Exposure"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/","url":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/","name":"Russian Hackers Target Microsoft, Stealing Source Code and Persistently Intruding | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/03\/Russian-Hackers-Target-Microsoft.png","datePublished":"2024-03-11T06:03:19+00:00","dateModified":"2024-03-11T07:40:07+00:00","description":"Russian Hackers Attack Microsoft - On March 8, the tech giant issued a warning about the relentless efforts of Russian state sponsored hackers linked to the notorious group Midnight Blizzard, also known as Nobelium.","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/03\/Russian-Hackers-Target-Microsoft.png","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/03\/Russian-Hackers-Target-Microsoft.png","width":1280,"height":720,"caption":"Russian Hackers Attack Microsoft"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/russian-hackers-target-microsoft-stealing-source-code-and-persistently-intruding\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Russian Hackers Target Microsoft, Stealing Source Code and Persistently Intruding"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/5c69c0bdd8490edfc08d16d35d727470","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=4544"}],"version-history":[{"count":10,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4544\/revisions"}],"predecessor-version":[{"id":4556,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4544\/revisions\/4556"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/4554"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=4544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=4544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=4544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}