Anatomy of a Breach

Anatomy of a Breach: Microsoft — Russia's Midnight Blizzard Reads Executives' Email Through a Legacy OAuth App

> series: anatomy_of_a_breach —— part: 181 —— target: microsoft_corporate —— attacker: midnight_blizzard_svr —— method: password_spray_legacy_oauth_no_mfa<span class="cursor-blink">_</span>_

Hedgehog Security 31 January 2024 14 min read

Microsoft's own executives. Russia's SVR. A legacy test account. No MFA.

On 19 January 2024, Microsoft disclosed that Midnight Blizzard — the Russian SVR intelligence service, the same group behind the SolarWinds/Sunburst attack — had accessed the corporate email accounts of Microsoft's senior leadership team, cybersecurity personnel, and legal staff. The attackers had been reading executive emails since at least November 2023.

The attack chain was remarkably simple: the attackers used password spraying (trying common passwords against multiple accounts) to compromise a legacy test tenant account that did not have multi-factor authentication enabled. That test account had residual permissions to a legacy OAuth application, which in turn had elevated access to Microsoft's corporate environment. From there, the attackers accessed executive mailboxes — including those of cybersecurity and legal staff, suggesting they were seeking to understand what Microsoft knew about Midnight Blizzard's operations. Microsoft — the company whose Entra ID (Azure AD) platform manages identity for millions of organisations — was compromised through the most basic authentication failure: a test account with no MFA.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

A test account. Legacy OAuth. No MFA. At Microsoft.

No MFA on a Test Account
The initial compromise was through a test account without MFA — a legacy configuration that had not been cleaned up. If Microsoft — the company that builds MFA solutions — has test accounts without MFA, the question for every organisation is: what legacy accounts exist in your environment without MFA? <a href="/cyber-essentials">Cyber Essentials Danzell</a> mandates MFA on all accounts and requires removal of unused accounts. Our <a href="/penetration-testing/infrastructure">internal testing</a> identifies accounts without MFA.
Legacy OAuth Permissions
The test account had permissions to a legacy OAuth application with elevated access — a residual configuration from an earlier era. Legacy applications with excessive permissions are a persistent threat in cloud environments. Our <a href="/penetration-testing/cloud-configuration-review">cloud configuration reviews</a> assess OAuth application permissions, consent grants, and legacy app registrations.
SVR Targeting Security Staff Emails
Midnight Blizzard specifically targeted the emails of Microsoft's cybersecurity and legal teams — seeking intelligence about what Microsoft knew about their operations. This is counter-intelligence tradecraft: understanding the defender's knowledge and capabilities. <a href="https://www.cyber-defence.io/services/threat-intelligence">UK Cyber Defence's threat intelligence</a> helps organisations understand what nation-state adversaries may be seeking.
If Microsoft Can Be Breached This Way...
Microsoft is one of the world's most technically sophisticated organisations, with dedicated security teams and advanced detection capabilities. Yet it was compromised through a test account with no MFA. The lesson for every UK organisation: no one is immune to basic authentication failures. <a href="/penetration-testing">Penetration testing</a> finds these failures before nation-states do.

Clean up legacy accounts. Enforce MFA everywhere. Even Microsoft didn't.

The Microsoft/Midnight Blizzard breach reinforced that legacy configurations — test accounts, deprecated OAuth apps, residual permissions — create persistent attack surfaces that sophisticated adversaries will discover and exploit. Cyber Essentials Danzell mandates MFA on all accounts and requires regular access reviews. Our cloud configuration reviews identify legacy OAuth apps and excessive permissions. Internal testing finds accounts without MFA. SOC in a Box monitors for password-spraying and anomalous OAuth activity. And UK Cyber Defence provides incident response when nation-state intrusions are detected.


Russia breached Microsoft through a test account with no MFA. What legacy accounts exist in your environment?

<a href="/cyber-essentials">Cyber Essentials</a> mandates MFA everywhere. <a href="/penetration-testing/cloud-configuration-review">Cloud reviews</a> find legacy OAuth apps. <a href="/penetration-testing/infrastructure">Internal testing</a> identifies accounts without MFA.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles