Crash log exposed Microsoft Outlook keys to threat actor

By
Follow google news

How July’s Storm-0558 attack happened.

A security key written to a “crash dump” and then accessed by a compromised engineer account was the root cause of a Microsoft security exposure earlier this year.

Crash log exposed Microsoft Outlook keys to threat actor

In a detailed incident post-mortem, Microsoft said the errors resulted in Chinese threat actor Storm-0558 obtaining an MSA consumer key, allowing it to forge tokens for Outlook.com and Outlook Web Access (OWA).

With access to the Microsoft account consumer signing key, Storm-0558 was able to create consumer keys signed with a token that could also be accepted by enterprise systems.

Microsoft said it has updated its libraries to prevent this in the future.

Key material is not meant to leave Microsoft’s production environment, Microsoft said.

However, “a consumer signing system crash in April of 2021 resulted in a snapshot of the crashed process (“crash dump”). 

“The crash dumps, which redact sensitive information, should not include the signing key," Microsoft wrote.

“In this case, a race condition allowed the key to be present in the crash dump," the vendor said, adding the issue "has been corrected".

Furthermore, Microsoft’s systems didn’t detect the presence of the key material in the crash dump, an issue which the company said has also been fixed.

The crash dump “was subsequently moved from the isolated production network into our debugging environment on the internet connected corporate network."

“This is consistent with our standard debugging processes. Our credential scanning methods did not detect its presence (this issue has been corrected),” the post-mortem states.

Microsoft hasn’t been able to determine exactly how the Storm-0558 actor gained access to the key, but believes it was via a compromised Microsoft engineer’s corporate account, which had access to the debugging environment containing the crash dump.

The company also said it has resolved how the race condition allowed the signing key to be part of the crash dump.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

The BoM has finally tamed SSL

The BoM has finally tamed SSL

Scores of Australian Cisco devices remain BADCANDY infected

Scores of Australian Cisco devices remain BADCANDY infected

US prosecutors say cyber security pros ran cybercrime operation

US prosecutors say cyber security pros ran cybercrime operation

Tasmanian gov agencies impacted by cyber attack

Tasmanian gov agencies impacted by cyber attack

Log In

  |  Forgot your password?