{"id":55535,"date":"2024-03-08T20:34:03","date_gmt":"2024-03-08T20:34:03","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35631\/Microsoft-Under-Constant-Attack-By-Russian-Hackers-Filing-Says.html"},"modified":"2024-03-08T20:34:03","modified_gmt":"2024-03-08T20:34:03","slug":"microsoft-under-constant-attack-by-russian-hackers-filing-says","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/","title":{"rendered":"Microsoft Under Constant Attack By Russian Hackers, Filing Says"},"content":{"rendered":"<figure class=\"sc-1eow4w5-1 fuSEnv align--bleed js_marquee-assetfigure\" id data-id=\"3dd028a43229fd3c94c91b759cd06ed1\" data-recommend-id=\"image:\/\/3dd028a43229fd3c94c91b759cd06ed1\" data-format=\"jpg\" data-width=\"6000\" data-height=\"3375\" data-lightbox=\"true\" data-recommended=\"true\" data-hide=\"false\" contenteditable=\"false\" draggable=\"false\" readability=\"3\">\n<div class=\"sc-1eow4w5-2 fDJNBs has-data img-wrapper\" contenteditable=\"false\" data-link-reference data-link-target data-syndicationrights=\"true\" data-imagerights=\"ap\" data-hide=\"false\" data-hidecredit=\"false\" readability=\"11\"><span class=\"sc-1eow4w5-0 knmQPh js_lightbox-wrapper\"><\/p>\n<div class=\"sc-1eow4w5-3 hGpdBg\"><picture class=\"sc-epkw7d-0 diKDHf\"><source media=\"(max-width: 37.31em)\" type=\"image\/jpeg\" srcset=\"https:\/\/i.kinja-img.com\/image\/upload\/c_fit,q_60,w_645\/3dd028a43229fd3c94c91b759cd06ed1.jpg\"><source media=\"(min-width: 37.37em)\" type=\"image\/jpeg\" srcset=\"https:\/\/i.kinja-img.com\/image\/upload\/c_fit,q_60,w_1315\/3dd028a43229fd3c94c91b759cd06ed1.jpg\"><img decoding=\"async\" alt=\"File photo of a surveillance camera near the Microsoft office building in Beijing, China on July 20, 2021.\" data-chomp-id=\"3dd028a43229fd3c94c91b759cd06ed1\" data-format=\"jpg\" data-height=\"3375\" data-alt=\"File photo of a surveillance camera near the Microsoft office building in Beijing, China on July 20, 2021.\" data-anim-src src=\"https:\/\/i.kinja-img.com\/image\/upload\/c_fit,q_60,w_645\/3dd028a43229fd3c94c91b759cd06ed1.jpg\"><\/picture><\/div>\n<p><\/span><\/p>\n<p><figcaption class=\"sc-1ptbguh-0 dHvBHx caption\">File photo of a surveillance camera near the Microsoft office building in Beijing, China on July 20, 2021.<\/figcaption><figcaption class=\"sc-7s1ndr-0 fPOdhF has-caption\">Photo<!-- -->: <!-- -->Andy Wong, File<!-- --> (<!-- -->AP<!-- -->)<\/figcaption><\/p>\n<\/div>\n<p><span data-id=\"3dd028a43229fd3c94c91b759cd06ed1\" data-recommend-id=\"image:\/\/3dd028a43229fd3c94c91b759cd06ed1\" data-format=\"jpg\" data-width=\"6000\" data-height=\"3375\" data-lightbox=\"true\" data-recommended=\"true\" data-hide=\"false\" class=\"js_recommend\"><\/span><\/figure>\n<div class=\"sc-r43lxo-1 cwnrYD\" readability=\"50.41592920354\">\n<p class=\"sc-77igqf-0 fnnahv\">Hackers linked to the Russian government keep trying to penetrate <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/gizmodo.com\/microsoft-copilot-demons-prompted-abortion-rights-image-1851312215&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/gizmodo.com\/microsoft-copilot-demons-prompted-abortion-rights-image-1851312215\">Microsoft\u2019s<\/a><\/span> systems using information stolen in a hack from late 2023, according to an announcement from the tech company. The latest intrusion was serious enough that Microsoft filed a report with the <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.sec.gov\/ixviewer\/ix.html?doc=\/Archives\/edgar\/data\/0000789019\/000119312524062997\/d808756d8ka.htm&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.sec.gov\/ixviewer\/ix.html?doc=\/Archives\/edgar\/data\/0000789019\/000119312524062997\/d808756d8ka.htm\" target=\"_blank\" rel=\"noopener noreferrer\">SEC<\/a><\/span>.<\/p>\n<div class=\"sc-1needdh-1 fzSzvw\">\n<div class=\"sc-1needdh-0 enlHCF instream-native-video instream-permalink instream-native-video--mobile\">\n<div class=\"sc-1h0epat-0 jiQRXG\">\n<div class=\"sc-1wkneyl-4 kDKXjm video-html5-playlist\" data-playlist=\"193866,190490,193593\" data-current=\"193866\">\n<div class=\"sc-1wkneyl-0 hAZDOz video-html5-loaded\">\n<div class=\"sc-1wkneyl-1 jShsAa video-html5-player\">\n<div class=\"sc-lhhce6-0 biVjcq video-html5 autoplay muted mobile\" data-video-id=\"193866\" data-monetizable=\"true\" data-position=\"sidebar\" data-video-title=\"Warning! Microsoft Wants ChatGPT to Control Robots Next\" data-video-blog-id=\"4\" data-video-network=\"gizmodo\" data-video-duration=\"140\" readability=\"4.6046511627907\">\n<div class=\"sc-lhhce6-2 emBeiF video-top-bar\" readability=\"7\">\n<p>Warning! Microsoft Wants ChatGPT to Control Robots Next<\/p>\n<\/div>\n<p><video disablepictureinpicture muted playsinline width=\"100%\" height=\"100%\" crossorigin=\"anonymous\" preload=\"none\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/193866\/193866_240p.mp4\" label=\"240p\" type=\"video\/mp4\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/193866\/193866_480p.mp4\" label=\"480p\" type=\"video\/mp4\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/193866\/193866_720p.mp4\" label=\"720p\" type=\"video\/mp4\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/193866\/193866_1080p.mp4\" label=\"1080p\" type=\"video\/mp4\"><track kind=\"captions\" label=\"English\" src=\"https:\/\/kinja.com\/api\/videoupload\/caption\/19324.vtt\" srclang=\"en\"><\/video><\/p>\n<div class=\"sc-1yhvqfu-3 ghtqRH video-controls\">\n<div class=\"sc-1yhvqfu-2 elBHkL\">\n<div class=\"sc-1sfctwm-2 fXTnmP closed-captions-box hide\">\n<div class=\"sc-1sfctwm-1 jglhFk\">\n<div class=\"sc-1sfctwm-0 hbyQRD\">\n<ul>\n<li class=\"selected\" data-label>Off<\/li>\n<li class data-label=\"English\">English<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">The Russian hackers have been dubbed Midnight Blizzard, previously known as Nobelium, which the U.S. and UK governments believe is attached to Russia\u2019s Foreign Intelligence Service. The group has been around since at least <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/08\/02\/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/08\/02\/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams\/\" target=\"_blank\" rel=\"noopener noreferrer\">early 2018<\/a><\/span>.<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">\u201cIn recent weeks, we have seen evidence that Midnight Blizzard is using information initially exfiltrated from our corporate email systems to gain, or attempt to gain, unauthorized access. This has included access to some of the company\u2019s source code repositories and internal systems,\u201d Microsoft wrote in an update <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/msrc.microsoft.com\/blog\/2024\/03\/update-on-microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/msrc.microsoft.com\/blog\/2024\/03\/update-on-microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/\" target=\"_blank\" rel=\"noopener noreferrer\">on Friday<\/a><\/span>. <\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">\u201cTo date we have found no evidence that Microsoft-hosted customer-facing systems have been compromised,\u201d the announcement continued. <\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">According to a <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.sec.gov\/ixviewer\/ix.html?doc=\/Archives\/edgar\/data\/0000789019\/000119312524062997\/d808756d8ka.htm&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.sec.gov\/ixviewer\/ix.html?doc=\/Archives\/edgar\/data\/0000789019\/000119312524062997\/d808756d8ka.htm\" target=\"_blank\" rel=\"noopener noreferrer\">new filing<\/a><\/span>, Midnight Blizzard had gained access to \u201ca very small percentage of employee email accounts\u201d in late 2023 that includes \u201cmembers of our senior leadership team and employees in our cybersecurity, legal, and other functions.\u201d<\/p>\n<p class=\"sc-77igqf-0 fnnahv\">Microsoft says it\u2019s seen an increase in the number of brute force password-guessing, known as password sprays, noting a 10-fold increase in February compared to the \u201calready large volume\u201d the company saw in January.<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">\u201cIt is apparent that Midnight Blizzard is attempting to use secrets of different types it has found. Some of these secrets were shared between customers and Microsoft in email, and as we discover them in our exfiltrated email, we have been and are reaching out to these customers to assist them in taking mitigating measures,\u201d Microsoft explained.<\/p>\n<p class=\"sc-77igqf-0 fnnahv\">But Microsoft isn\u2019t Midnight Blizzard\u2019s only target. Hewlett Packard Enterprise revealed in a filing back in late December its Office 365 cloud email environment had been compromised by the <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.crn.com\/news\/security\/2024\/analysis-hpe-hack-shows-how-the-sec-s-disclosure-rule-is-playing-out&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.crn.com\/news\/security\/2024\/analysis-hpe-hack-shows-how-the-sec-s-disclosure-rule-is-playing-out\" target=\"_blank\" rel=\"noopener noreferrer\">same group<\/a><\/span>.<\/p>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35631\/Microsoft-Under-Constant-Attack-By-Russian-Hackers-Filing-Says.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55536,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10875],"class_list":["post-55535","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentmicrosoftrussiacyberwarbackdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Under Constant Attack By Russian Hackers, Filing Says 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Under Constant Attack By Russian Hackers, Filing Says 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-08T20:34:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.kinja-img.com\/image\/upload\/c_fit,q_60,w_645\/3dd028a43229fd3c94c91b759cd06ed1.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Under Constant Attack By Russian Hackers, Filing Says\",\"datePublished\":\"2024-03-08T20:34:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/\"},\"wordCount\":357,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says.jpg\",\"keywords\":[\"headline,hacker,government,microsoft,russia,cyberwar,backdoor\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/\",\"name\":\"Microsoft Under Constant Attack By Russian Hackers, Filing Says 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says.jpg\",\"datePublished\":\"2024-03-08T20:34:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says.jpg\",\"width\":645,\"height\":363},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-under-constant-attack-by-russian-hackers-filing-says\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,microsoft,russia,cyberwar,backdoor\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentmicrosoftrussiacyberwarbackdoor\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Under Constant Attack By Russian Hackers, Filing Says\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Under Constant Attack By Russian Hackers, Filing Says 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Under Constant Attack By Russian Hackers, Filing Says 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-03-08T20:34:03+00:00","og_image":[{"url":"https:\/\/i.kinja-img.com\/image\/upload\/c_fit,q_60,w_645\/3dd028a43229fd3c94c91b759cd06ed1.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Under Constant Attack By Russian Hackers, Filing Says","datePublished":"2024-03-08T20:34:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/"},"wordCount":357,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/microsoft-under-constant-attack-by-russian-hackers-filing-says.jpg","keywords":["headline,hacker,government,microsoft,russia,cyberwar,backdoor"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/","name":"Microsoft Under Constant Attack By Russian Hackers, Filing Says 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/microsoft-under-constant-attack-by-russian-hackers-filing-says.jpg","datePublished":"2024-03-08T20:34:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/microsoft-under-constant-attack-by-russian-hackers-filing-says.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/microsoft-under-constant-attack-by-russian-hackers-filing-says.jpg","width":645,"height":363},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-under-constant-attack-by-russian-hackers-filing-says\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,microsoft,russia,cyberwar,backdoor","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentmicrosoftrussiacyberwarbackdoor\/"},{"@type":"ListItem","position":3,"name":"Microsoft Under Constant Attack By Russian Hackers, Filing Says"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55535"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55535\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55536"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}