Inside the Storm-0558 Hack: Microsoft’s MSA Key Breach Explained
Cybersecurity3 min read

Inside the Storm-0558 Hack: Microsoft’s MSA Key Breach Explained

7 Sept 20237 Sept 2023 techtarget.com

Microsoft has confirmed the breach of an MSA consumer signing key by the Storm-0558 hackers, exposing vulnerabilities within its security framework. The incident raised questions about Microsoft's logging practices and response strategies.

Key Takeaways

  • 1.But this was the most probable mechanism by which the actor acquired the key," the company admitted.
  • 2.In July, Microsoft first revealed that the hackers utilized a stolen Microsoft account (MSA) signing key to falsify authentication tokens for services such as Outlook Web Access and Outlook.com.
  • 3."After April 2021, when the key was leaked to the corporate environment in the crash dump, the Storm-0558 actor was able to successfully compromise a Microsoft engineer's corporate account," the blog noted.

Following weeks of speculations, Microsoft has confirmed that the breach of a consumer signing key used to compromise email accounts earlier this year originated from its own network. The company attributed the incident to a China-based hacking group known as Storm-0558, which managed to infiltrate the accounts of around 25 organizations, including several U.S. federal agencies.

In July, Microsoft first revealed that the hackers utilized a stolen Microsoft account (MSA) signing key to falsify authentication tokens for services such as Outlook Web Access and Outlook.com. This breach was further compounded by the exploitation of a token validation vulnerability, which allowed the attackers to impersonate Azure Active Directory users and gain unauthorized access to their emails.

Critics have scrutinized Microsoft’s response to the breach, particularly regarding a perceived lack of transparency about how the MSA key was compromised. Concerns were also raised about the limited logging capabilities that hampered the detection of the Storm-0558 intrusion.

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

Race Results

On September 6, Microsoft disclosed the results of an internal investigation, revealing that the stolen key was accessed due to a series of security missteps. Remarkably, the breach began when Storm-0558 accessed a Microsoft engineer's account, allowing them to navigate across the Microsoft network and reach a debugging environment where the MSA key was inadvertently stored.

Race Results

"Our investigation found that a consumer signing system crash in April of 2021 resulted in a snapshot of the cached process ('crash dump'). The crash dumps, which redact sensitive information, should not include the signing key," reported Microsoft through its blog. "In this case, a race condition allowed the key to be present in the crash dump (this issue has been corrected)."

The company outlined six distinct security errors that led to this breach, allowing Storm-0558 to gain escalated access to sensitive materials. Notably, a crash dump that mistakenly contained the MSA key was not detected due to shortcomings in Microsoft's monitoring systems, though these deficiencies have since been addressed.

However, the narrative did not end there. On March 12, 2024, Microsoft updated the blog to reflect that the investigation found no evidence linking the MSA key’s presence to a crash dump. This clarified its position when the Cyber Safety Review Board, part of the Department of Homeland Security, concluded the investigation into the Storm-0558 attacks.

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

When questioned about whether the race condition stemmed from an inherent vulnerability within a product, a Microsoft spokesperson clarified, "Vulnerability is a specific term... ‘Issue’ in the blog refers to things such as misconfiguration, operator errors or unintended byproducts of other actions."

As the incident unfolded, it was also revealed that the MSA key had been moved from an isolated production network into the internet-connected debugging environment without proper safeguards. "After April 2021, when the key was leaked to the corporate environment in the crash dump, the Storm-0558 actor was able to successfully compromise a Microsoft engineer's corporate account," the blog noted.

"After April 2021, when the key was leaked to the corporate environment in the crash dump, the Storm-0558 actor was able to successfully compromise a Microsoft engineer's corporate account,"

The compromised engineer's account was infected with token-stealing malware, but the specifics regarding the credential theft remained vague. The attackers utilized this account to access sensitive areas, including the crash dump containing the MSA key.

Looking Ahead

The ongoing scrutiny of Microsoft's security and responsiveness following this episode underscores the heightened vulnerabilities faced by large tech firms. As they advance in technology, maintaining robust cybersecurity practices becomes increasingly vital to safeguarding sensitive data against sophisticated threats like Storm-0558. The question remains—will Microsoft implement broader reforms to prevent future oversight?

More Stories