• Awoo [she/her]@hexbear.net
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    1 year ago

    I really struggle to believe that a military performing espionage actions is stupid enough to operate without spreading hours of operation in a harder to track way. But maybe they don’t give a shit? Just seems like something you could easily hide.

    EDIT: Question - Why would an inactive microsoft consumer account have the ability to forge tokens for Outlook.com? Would this not limit it to a specific subset of accounts?

    We determined that Storm-0558 was accessing the customer’s Exchange Online data using Outlook Web Access (OWA).

    Ahh yes, this would be one specific customer of microsoft that was targeted. Hopefully the NSA or some shit lmao