Search
Close this search box.
Search
Close this search box.

Chinese Hackers Got Access to Western European Governments Emails

Microsoft updates ChatGPT for Privacy

According to Microsoft Corp. emails connected to Western European government agencies have been compromised by a hacker gang based in China.

Microsoft stated in a blog post on Tuesday that the Storm-0558 gang specializes in crimes like data theft and espionage.

The gang had gone undetected for nearly a month until customers complained to Microsoft about unusual mail activity. The group had gotten access to email accounts affecting roughly 25 businesses, including government institutions, and to accounts of individuals associated to these organizations.

“We assess this adversary is focused on espionage, such as gaining access to email systems for intelligence collection,” Charlie Bell, executive vice president of security at Microsoft, stated in a separate Microsoft post.

The breach was caused by hackers creating fake authentication tokens, which are bits of data used to confirm a user’s identity and are necessary to access email accounts. Since then, Microsoft has addressed the incident and contacted any impacted customers.

Microsoft claimed that, among other organizations, it collaborates with the Department of Homeland Security and the Cybersecurity and Infrastructure Security Agency to thwart such assaults.

Additionally, it declared that it will keep an eye on Storm-0558’s operations.

The Storm-0558 attack is the most recent security lapse that has been linked to hackers in China.

An email security program with a well-known security flaw was used by suspected state-backed Chinese hackers to breach the networks of hundreds of public and private sector companies worldwide, according to Mandiant, a Google-owned cybersecurity company.

Microsoft claimed earlier this year that state-sponsored Chinese hackers have been attacking vital American infrastructure and may be setting the technical stage for the potential interruption of vital communications between the United States and Asia in the event of future crises.

China claims that the U.S. hacks into the systems of its colleges and businesses as part of its cyberespionage campaign against it.


Subscribe to Our Newsletter

Related Articles

Top Trending

Best Virtual Real Estate Investments in the Metaverse
The Best Virtual Real Estate Investments in the Metaverse Right Now
Dogecoin Bitcoin Rally
Dogecoin Gains 27%, Bitcoin Nears All-Time High Amid Crypto Boom
Tom Cruise and Nicole Kidman
Tom Cruise Honors Nicole Kidman’s Talent in Rare Interview
motherhood in 2025
Motherhood in 2025: How Tech, Work, and Love Intersect
India Pakistan ceasefire
India-Pakistan Ceasefire: Will This Fragile Peace Agreement Hold?

LIFESTYLE

Mother's Day Around The World
Mother’s Day Traditions Around the World: Mother's Day 2025 Special
summer birthday party ideas
Creative Summer Birthday Party Ideas for Kids in 2025
May 6 Zodiac
May 6 Zodiac: Positive Traits, Compatibility and More about Taurus
self storage solutions for life transitions
How Self Storage Can Help During Major Life Changes (Divorce, Moving, etc.)?
why is my poinsettia dying
Why Is My Poinsettia Dying? Tips To Revive Your Wilting Poinsettia Plant

Entertainment

Tom Cruise and Nicole Kidman
Tom Cruise Honors Nicole Kidman’s Talent in Rare Interview
machine gun kelly new tattoo
Machine Gun Kelly Debuts New Tattoo: A Blackout Masterpiece
tickzoo
Tickzoo Review: Discover Comprehensive Insights on Tick Management
How Old is Hasbulla
How Old is Hasbulla? Discover the Age of the Internet's Favorite Miniature MMA Fighter
jack doherty net worth
Jack Doherty Net Worth: From Flipping Markers To Making Big Bucks

GAMING

Accessibility in Modern Games
How Accessibility Options Are Revolutionizing Modern Games?
Games Without Taking Damage
Can You Beat These Games Without Taking Damage?
Ray Tracing Game Graphics
Ray Tracing in 2025: Game Graphics Enter a New Era
Blockchain in Gaming
7 Ways Blockchain Is Impacting The Future Of Gaming
Science Of Gaming Addiction
The Science Of Gaming Addiction: How To Balance Fun & Health

BUSINESS

Dogecoin Bitcoin Rally
Dogecoin Gains 27%, Bitcoin Nears All-Time High Amid Crypto Boom
Defi loans for businesses
How DeFi Loans Are Helping Businesses Access Capital Without Banks?
Powerful Triggers That Build Business Loyalty
The Psychology of Corporate Gifting: 7 Powerful Triggers That Build Business Loyalty
Business Behind Game Localization
The Business Behind Game Localization: How It Works
International Employment Agencies
How international employment agencies can help you find talent in hard-to-reach markets?

TECHNOLOGY

Best Virtual Real Estate Investments in the Metaverse
The Best Virtual Real Estate Investments in the Metaverse Right Now
AI Avatars in Virtual Social Interactions
How AI Avatars Are Changing Virtual Social Interactions?
Ray Tracing Game Graphics
Ray Tracing in 2025: Game Graphics Enter a New Era
AI and Automation
How AI and Automation Are Helping Secure Document Redaction?
bill gates accuses elon musk of harming poor children
Bill Gates Blames Elon Musk for Harming World's Poorest Children

HEALTH

Yimusanfendi
7 Incredible Benefits of Yimusanfendi Meditation and Possible Side Effects
Connection Between Hydration and Urinary Health
The Connection Between Hydration and Urinary Health
Neuralink Brain Implant Patient Regains Speech
Neuralink Brain Implant Helps ALS Patient Regain Speech with AI Support
Wegovy for Weight Loss
Wegovy for Weight Loss: Is It Worth Buying Online?
Role of Sperm DNA Fragmentation Testing in IVF
The Role of Sperm DNA Fragmentation Testing in IVF with ICSI Success