Unable to load image

Microsoft Details How Chinese Hackers Acquired Signing Key for Outlook Breach | PCMag

https://www.pcmag.com/news/microsoft-details-how-chinese-hackers-acquired-signing-key-for-outlook

Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

19
Jump in the discussion.

No email address required.

:marseyk#ey: :!marseyje#woftheorient:


:!marseybooba:

Jump in the discussion.

No email address required.

Incredible work from Microsoft here :marseyclapping:


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

accidentally leaked through a 'crash dump' file

Who could have forseen this? :marseyfacepalm:

Jump in the discussion.

No email address required.

I'm kind of regarded but wouldn't storing the signing key in a TPM (like required for Win11) or similar like a yubikey prevent the key from being in memory?


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

lol Microsoft knows firsthand that the TPM is :marseyglow:

Jump in the discussion.

No email address required.

Actually pretty neat, especially for a Chinese actor.

Jump in the discussion.

No email address required.

I wonder if they expected more of a challenge after presumably hacking the engineer.


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

Well they most certainly didn't expect to find that key in there, but that was a very nice prize. Well used to, since they had it for two years. That's way above most Chinese espionage groups activities / capabilities, it reminds me of the guys that captured, reverse engineered and repurposed a NSA 0day years ago. It's nice to see proper ops from time to time.

Jump in the discussion.

No email address required.

The only thing that is advanced from this thread is my stage 4 cancer from reading it.

Snapshots:

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.