> series: anatomy_of_a_breach —— part: 181 —— target: microsoft_corporate —— attacker: midnight_blizzard_svr —— method: password_spray_legacy_oauth_no_mfa<span class="cursor-blink">_</span>_
On 19 January 2024, Microsoft disclosed that Midnight Blizzard — the Russian SVR intelligence service, the same group behind the SolarWinds/Sunburst attack — had accessed the corporate email accounts of Microsoft's senior leadership team, cybersecurity personnel, and legal staff. The attackers had been reading executive emails since at least November 2023.
The attack chain was remarkably simple: the attackers used password spraying (trying common passwords against multiple accounts) to compromise a legacy test tenant account that did not have multi-factor authentication enabled. That test account had residual permissions to a legacy OAuth application, which in turn had elevated access to Microsoft's corporate environment. From there, the attackers accessed executive mailboxes — including those of cybersecurity and legal staff, suggesting they were seeking to understand what Microsoft knew about Midnight Blizzard's operations. Microsoft — the company whose Entra ID (Azure AD) platform manages identity for millions of organisations — was compromised through the most basic authentication failure: a test account with no MFA.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Microsoft/Midnight Blizzard breach reinforced that legacy configurations — test accounts, deprecated OAuth apps, residual permissions — create persistent attack surfaces that sophisticated adversaries will discover and exploit. Cyber Essentials Danzell mandates MFA on all accounts and requires regular access reviews. Our cloud configuration reviews identify legacy OAuth apps and excessive permissions. Internal testing finds accounts without MFA. SOC in a Box monitors for password-spraying and anomalous OAuth activity. And UK Cyber Defence provides incident response when nation-state intrusions are detected.
<a href="/cyber-essentials">Cyber Essentials</a> mandates MFA everywhere. <a href="/penetration-testing/cloud-configuration-review">Cloud reviews</a> find legacy OAuth apps. <a href="/penetration-testing/infrastructure">Internal testing</a> identifies accounts without MFA.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call