{"id":53574,"date":"2023-09-07T13:28:26","date_gmt":"2023-09-07T13:28:26","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34987\/Crash-Dump-Error-How-A-Chinese-Espionage-Group-Exploited-Microsofts-Mistakes.html"},"modified":"2023-09-07T13:28:26","modified_gmt":"2023-09-07T13:28:26","slug":"crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/","title":{"rendered":"Crash Dump Error: How A Chinese Espionage Group Exploited Microsoft&#8217;s Mistakes"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/06\/Microsoft-DDoS-Attack.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>Microsoft has published a post-mortem detailing multiple errors that led to Chinese cyberspies hacking into US government emails, blaming the embarrassing incident on a crash dump stolen from a hacked engineer\u2019s corporate account.<\/strong>\n<\/p>\n<p>The crash dump, which dated back to April 2021, contained a Microsoft account (MSA) consumer key that was used to forge tokens to break into OWA and Outlook.com accounts.\n<\/p>\n<p>\u201cOur investigation found that a consumer signing system crash in April of 2021 resulted in a snapshot of the crashed process (\u201ccrash dump\u201d). The crash dumps, which redact sensitive information, should not include the signing key. In this case, a race condition allowed the key to be present in the crash dump,\u201d Microsoft explained.\n<\/p>\n<p>The software giant said the race condition issue has since been corrected.\n<\/p>\n<p>Redmond also acknowledged a failure of its internal systems to detect sensitive secrets leaking from crash dumps. \u201cThe key material\u2019s presence in the crash dump was not detected by our systems (this issue has been corrected),\u201d the company said.\n<\/p>\n<p>The company said the 2021 crash dump with signing key was subsequently moved from the isolated production network into its debugging environment on the internet connected corporate network.&nbsp;\n<\/p>\n<p>While this is consistent with Microsoft\u2019s standard debugging processes, Microsoft fessed up to another error where its credential scanning methods did not detect the presence of the key.<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Advertisement. Scroll to continue reading.<\/span><\/div>\n<p>\u201cAfter April 2021, when the key was leaked to the corporate environment in the crash dump, the Storm-0558 actor was able to successfully compromise a Microsoft engineer\u2019s corporate account. This account had access to the debugging environment containing the crash dump which incorrectly contained the key,\u201d <a href=\"https:\/\/msrc.microsoft.com\/blog\/2023\/09\/results-of-major-technical-investigations-for-storm-0558-key-acquisition\/\">the company explained<\/a>.\n<\/p>\n<p>In a stunning twist, Microsoft said that due to log retention policies, it does not have logs with specific evidence of this exfiltration by this actor, noting that the post-mortem is based on \u201cthe most probable mechanism by which the actor acquired the key.\u201d\n<\/p>\n<p>Microsoft\u2019s admission that it does not retain logs to spot this type of activity follows <a href=\"https:\/\/www.securityweek.com\/us-senator-wyden-accuses-microsoft-of-cybersecurity-negligence\/\">intense criticism<\/a> of the M365 licensing structure that essentially charges extra for customers to access forensics data during active malware investigations.\n<\/p>\n<p>Microsoft has since announced plans to <a href=\"https:\/\/www.securityweek.com\/microsoft-bows-to-pressure-to-free-up-cloud-security-logs\/\">expand logging defaults for lower-tier M365 customers<\/a> and increase the duration of retention for threat-hunting data.\n<\/p>\n<p>The compromise, which led to the theft of email from approximately 25 organizations, prompted a scathing letter from U.S. senator Ron Wyden calling on the government to hold Microsoft <a href=\"https:\/\/www.securityweek.com\/us-senator-wyden-accuses-microsoft-of-cybersecurity-negligence\/\">responsible for \u201cnegligent cybersecurity practices\u201d <\/a>that enabled \u201ca successful Chinese espionage campaign against the United States government.\u201d\n<\/p>\n<p>Last month, the U.S. government said its Cyber Safety Review Board (CSRB) would conduct an <a href=\"https:\/\/www.securityweek.com\/us-cyber-safety-board-to-review-cloud-attacks\">investigation into the Microsoft cloud hack<\/a> and expand to \u201cissues relating to cloud-based identity and authentication infrastructure affecting applicable CSPs and their customers\u201d.\n<\/p>\n<p><strong>Related: <\/strong><a href=\"https:\/\/www.securityweek.com\/us-senator-wyden-accuses-microsoft-of-cybersecurity-negligence\/\">US Senator Accuses Microsoft of \u2018Cybersecurity Negligence\u2019<\/a>\n<\/p>\n<p><strong>Related:<\/strong> <a href=\"https:\/\/www.securityweek.com\/microsoft-cloud-hack-exposed-more-than-exchange-outlook-emails\/\">Microsoft Cloud Hack Exposed More Than Emails<\/a>\n<\/p>\n<p><strong>Related: <\/strong><a href=\"https:\/\/www.securityweek.com\/chinese-cyberspies-used-forged-authentication-tokens-to-hack-government-emails\/\">Chinese APT Use Stolen Microsoft Key to Hack Gov Emails<\/a>\n<\/p>\n<p><strong>Related: <\/strong><a href=\"https:\/\/www.securityweek.com\/microsoft-bows-to-pressure-to-free-up-cloud-security-logs\/\">Microsoft Bows to Pressure to Free Up Cloud Security Logs<\/a>\n<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34987\/Crash-Dump-Error-How-A-Chinese-Espionage-Group-Exploited-Microsofts-Mistakes.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53575,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10674],"class_list":["post-53574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermicrosoftchinadata-losscyberwarcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Crash Dump Error: How A Chinese Espionage Group Exploited Microsoft&#039;s Mistakes 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crash Dump Error: How A Chinese Espionage Group Exploited Microsoft&#039;s Mistakes 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-07T13:28:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/06\/Microsoft-DDoS-Attack.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Crash Dump Error: How A Chinese Espionage Group Exploited Microsoft&#8217;s Mistakes\",\"datePublished\":\"2023-09-07T13:28:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/\"},\"wordCount\":520,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes.jpg\",\"keywords\":[\"headline,hacker,microsoft,china,data loss,cyberwar,cryptography\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/\",\"name\":\"Crash Dump Error: How A Chinese Espionage Group Exploited Microsoft's Mistakes 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes.jpg\",\"datePublished\":\"2023-09-07T13:28:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,microsoft,china,data loss,cyberwar,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermicrosoftchinadata-losscyberwarcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Crash Dump Error: How A Chinese Espionage Group Exploited Microsoft&#8217;s Mistakes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Crash Dump Error: How A Chinese Espionage Group Exploited Microsoft's Mistakes 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/","og_locale":"en_US","og_type":"article","og_title":"Crash Dump Error: How A Chinese Espionage Group Exploited Microsoft's Mistakes 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-09-07T13:28:26+00:00","og_image":[{"url":"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/06\/Microsoft-DDoS-Attack.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Crash Dump Error: How A Chinese Espionage Group Exploited Microsoft&#8217;s Mistakes","datePublished":"2023-09-07T13:28:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/"},"wordCount":520,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes.jpg","keywords":["headline,hacker,microsoft,china,data loss,cyberwar,cryptography"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/","url":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/","name":"Crash Dump Error: How A Chinese Espionage Group Exploited Microsoft's Mistakes 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes.jpg","datePublished":"2023-09-07T13:28:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/crash-dump-error-how-a-chinese-espionage-group-exploited-microsofts-mistakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,microsoft,china,data loss,cyberwar,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermicrosoftchinadata-losscyberwarcryptography\/"},{"@type":"ListItem","position":3,"name":"Crash Dump Error: How A Chinese Espionage Group Exploited Microsoft&#8217;s Mistakes"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53574"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53574\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53575"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}