Microsoft said the group behind theSolarWinds attack is targetinggovernment agencies, NGOs, and think tanks.- Nobelium, a Russian group, sent about 3,000 malicious emails to accounts across 150 different organizations, Microsoft said.
- Nobelium broke into an email marketing account used by a US aid agency to stage the email campaign, Microsoft said.
The group behind the SolarWinds cybersecurity attack is now targeting government agencies, think tanks, consultants, and non-governmental organizations, Microsoft said on Thursday.
Russian-based Nobelium targeted around 3,000 email accounts across more than 150 different organizations, Tom Burt, Microsoft vice president of customer security and trust, wrote in a blog post on Thursday.
Nobelium carried out these attacks by breaking into an email marketing account called Constant Contact, used by the
The
Burt said in the blog that US organizations had the biggest share of cyber attacks, but other targeted victims came from at least 24 countries.
At least a quarter of the targeted organisations were involved in international development, humanitarian issues, and human-rights work, Burt said.
The
This month, Russia's spy chief denied responsibility for the SolarWinds cyberattack, but said he was "flattered" by the accusations from the US and Britain that Russian foreign intelligence was behind such a sophisticated hack.
The US and Britain have blamed Russia's Foreign Intelligence Service (SVR) for the hack, which compromised nine US federal agencies and hundreds of private sector companies.
The attacks disclosed by Microsoft on Thursday appeared to be a continuation of multiple efforts to target government agencies involved in foreign policy as part of intelligence gathering efforts, according to Microsoft.
"Many of the attacks targeting our customers were blocked automatically, and Windows Defender is blocking the malware involved in this attack," Microsoft said in the blog.
The company said it was in the process of notifying all its targeted customers and had "no reason to believe" these attacks involved any exploitation or vulnerability in Microsoft's products or services.