Microsoft emails that warned customers of Russian hacks criticized for looking like spam and phishing
In March, Microsoft confirmed that Russian government hackers known as Midnight Blizzard (or APT29) had broken into its systems with the goal of stealing various kinds of information, including data on Microsoft customers.Â
Months later, Microsoft is still in the process of notifying its affected customers, and it looks like the process isnât going very well, with experts criticizing Microsoft for sending emails that look like spam, or even phishing attempts.Â
Kevin Beaumont, a former Microsoft employee and now a cybersecurity researcher who closely follows the company, has been warning companies to keep an eye out for these Microsoft emails.Â
âMicrosoft had a breach by Russia impacting customer data and didnât follow the Microsoft 365 customer data breach process. The notifications arenât in the portal, they emailed tenant admins instead.â Beaumont wrote on his LinkedIn account. âThe emails can go into spam â and tenant admin accounts are supposed to be secure breakglass accounts without email. They also havenât informed orgs via account managers. You want to check all emails going back to June. It is widespread.â
One of the main issues with Microsoftâs notification email is that it includes a âsecure linkâ to a domain that bears no apparent connection to Microsoft. Instead, the email includes a link to: âpurviewcustomer.powerappsportals.com.âÂ
âBasically, the critical alert looks like a phishing attack,â one person wrote on X.
That link has been submitted to urlscan.io, a site that can help spot malicious links, more than a hundred times. That suggests that there are a lot of organizations that saw that official legitimate Microsoft email and thought it was malicious.
Contact Us
Do you have more information about this Microsoft incident? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or email. You also can contact TechCrunch via SecureDrop.
The urlscan.io submissions also suggest there are at least a hundred companies that were affected by the Russian government hack on Microsoft. U.S. cybersecurity agency CISA previously said that the Russian hackers also stole emails of several federal agencies.Â
Apart from Beaumontâs warnings, there is some evidence that Microsoft customers are legitimately confused. In a Microsoft support portal, one customer shared the email their organization received in an attempt to get clarity on whether it was a genuine Microsoft email.Â
âThis email has several red flags for me, the request for the TenantID and essentially admin or high level email addresses, the powerapps page being barebones, and some quick Googling not finding anything related to the title of this email or itâs [sic] contents,â the person wrote. âCan anyone confirm this is a legit Microsoft email request?â
Commenting on Beaumontâs LinkedIn post, a cybersecurity consultant said that âseveralâ of his clients received the email and âAll of them were worried it was phishing.â
âAt first glance, this did not inspire trust for the recipients, who started asking in forums or reaching out to Microsoft account managers to eventually confirm that the email was legitimateâŠweird way for a provider like this to communicate an important issue to potentially affected customers,â the consultant wrote.Â
Microsoft spokespeople did not respond when TechCrunch asked how many organizations have been notified, or if the company plans to change the way it notifies affected customers.Â