• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Downloads
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

Microsoft: North Korea Hackers Compromised Thousands of Accounts

Microsoft says hackers tied to North Korea have compromised thousands of accounts with an ongoing "spearphishing" campaign.

January 3, 2020 Adam Forziati Leave a Comment

Sophos Cybersecurity Trends

Microsoft says two hackers tied to North Korea have hacked thousands of individuals in university, government, and other sectors. Microsoft said in a lawsuit against the supposed North Korea hackers that “John Doe 1” and “John Doe 2” run a cybertheft network called “Thallium.”

The complaint says these individuals “are engaged in breaking into the Microsoft accounts and computer networks of Microsoft’s customers and stealing highly sensitive information.”

“The precise identities and locations of those behind the activity are generally unknown but have been linked by many in the security community to North Korean hacking groups.”

More from a CBS report:

Thallium is a network of websites, domains and computers that the alleged hackers use to infiltrate Microsoft user accounts, according to the company.

Microsoft said a “spearphishing” technique is used to pry sensitive information from employees at think tanks as well as government officials working on nuclear proliferation issues.

Court documents filed by Microsoft show copies of emails that company officials believe were used by Thallium during phishing attacks. Microsoft is accusing Thallium of computer fraud, electronic privacy violations, trademark infringement and more.

In July, Microsoft notified 10,000 of its customers that they had been targeted by hackers in Russia, Iran and North Korea over the past 12 months.

How they did it & are you affected?

The CBS report cites the complaint, describing the cyber thieves’ methods:

  • they select one employee from an org who uses Microsoft and locates their email address
  • they contact said employee by using a Hotmail, Gmail, or Yahoo email address, claiming there was “suspicious login activity” on their Microsoft account
  • that email has a link the user is encouraged to click to fix the issue
  • the link connects their computer to a Thallium-controlled site, which logs, reviews, and strips IP addresses to access critical data

The best way to detect a breach is to have your cyber security provider troll the dark web for personal information tied to your company or org’s email.

Related: How To Be Better Prepared for Higher Ed Data Breaches

Tagged With: Data Breach, Data Security, Microsoft

Related Content:

  • Vaccination Credential Initiative Tech, Health Giants To Create Digital Vaccination Records
  • Supply Chain Compromises How IT Leaders Can Protect Against Supply Chain…
  • building safety Many Workers Still Nervous About the Office: These…
  • Alarm.com sensor Alarm.com Sensor Extends Security and Awareness Across Properties

Free downloadable guide you may like:

  • Top 9 Reasons Enterprise IT Leaders Are Moving Their Video Surveillance to the Eagle Eye Cloud

    Working in IT has enough challenges without adding in the complications of surveillance video. Things like total cost of maintenance, how the VMA manages bandwidth, what cameras are supported, what level of cybersecurity is provided, and what integrations are available to use are important factors IT managers have to think about when assessing a video […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Top 9 Reasons Enterprise IT Leaders Are Moving Their Video Surveillance to the Eagle Eye Cloud

Working in IT has enough challenges without adding in the complications of surveillance video. Things like total cost of maintenance, how the VMA m...

Using Live Chats and Chatbots to Increase Customer Engagement

There's a lot to consider when building out a chatbot experience to ensure that it delivers a seamless experience and meet your business goals.

Finding a New Balance

The shift to a hybrid work environment is a trend that has increased in popularity over many years. The COVID-19 pandemic has spurred this trend, f...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2021 Emerald X, LLC. All rights reserved.