Chinese Hackers Got Access to Western European Governments Emails

Microsoft updates ChatGPT for Privacy

According to Microsoft Corp. emails connected to Western European government agencies have been compromised by a hacker gang based in China.

Microsoft stated in a blog post on Tuesday that the Storm-0558 gang specializes in crimes like data theft and espionage.

The gang had gone undetected for nearly a month until customers complained to Microsoft about unusual mail activity. The group had gotten access to email accounts affecting roughly 25 businesses, including government institutions, and to accounts of individuals associated to these organizations.

“We assess this adversary is focused on espionage, such as gaining access to email systems for intelligence collection,” Charlie Bell, executive vice president of security at Microsoft, stated in a separate Microsoft post.

The breach was caused by hackers creating fake authentication tokens, which are bits of data used to confirm a user’s identity and are necessary to access email accounts. Since then, Microsoft has addressed the incident and contacted any impacted customers.

Microsoft claimed that, among other organizations, it collaborates with the Department of Homeland Security and the Cybersecurity and Infrastructure Security Agency to thwart such assaults.

Additionally, it declared that it will keep an eye on Storm-0558’s operations.

The Storm-0558 attack is the most recent security lapse that has been linked to hackers in China.

An email security program with a well-known security flaw was used by suspected state-backed Chinese hackers to breach the networks of hundreds of public and private sector companies worldwide, according to Mandiant, a Google-owned cybersecurity company.

Microsoft claimed earlier this year that state-sponsored Chinese hackers have been attacking vital American infrastructure and may be setting the technical stage for the potential interruption of vital communications between the United States and Asia in the event of future crises.

China claims that the U.S. hacks into the systems of its colleges and businesses as part of its cyberespionage campaign against it.


Subscribe to Our Newsletter

Related Articles

Top Trending

Healthy Cholesterol Levels Maintenance
How To Maintain Healthy Cholesterol Levels: Effective Lifestyle Guide
us startups Upcycled Food Ingredients
10 US Startups Turning Food By-Products into High-Margin Upcycled Ingredients
fix Broken Dependencies In Ubuntu/Linux
How To Fix Broken Dependencies In Ubuntu/Linux: The Ultimate Guide
how to resolve Git Merge Conflicts
How To Fix Git Merge Conflicts Step-By-Step Guide
How to Switch to a Zero-Waste Lifestyle at Home
Zero-Waste Lifestyle at Home: Simple Beginner’s Guide

Fintech & Finance

EU's Preferred Fintech Licensing Gateway
10 Reasons Why Ireland Is the EU's Preferred Fintech Licensing Gateway in 2025
Top Mobile Apps for Personal Finance Management
Top Mobile Apps for Personal Finance Management You Must Try
Top QuickBooks Errors Preventing Company File Access
Top 10 QuickBooks Errors Preventing Company File Access
Best Neobanks New Zealand 2025
9 Best Neobanks and Digital Finance Apps Available in New Zealand 2025
Irish Credit Union Digital Generation
7 Key Ways Irish Credit Unions Are Competing with Neobanks for the Digital Generation

Sustainability & Living

us startups Upcycled Food Ingredients
10 US Startups Turning Food By-Products into High-Margin Upcycled Ingredients
How to Switch to a Zero-Waste Lifestyle at Home
Zero-Waste Lifestyle at Home: Simple Beginner’s Guide
Precision Agriculture Platforms
10 US Precision Agriculture Platforms Leading the Data-Driven Farm Revolution
Top Sustainable Home Decor Brands Worth Buying From
Sustainable Home Decor Brands You’ll Love in 2026
Sustainable Bio-Packaging in India
From Waste to Wealth: 15 Indian Tech Hubs Leading the Bio-Packaging Revolution 

GAMING

What Most Users Still Get Wrong When Comparing CS2 Skin Platforms
What Most Users Still Get Wrong When Comparing CS2 Skin Platforms?
How Technology Is Transforming the Online Gaming Industry
How Technology Is Transforming the Online Gaming Industry
Naruto Uzumaki In The Manga
Naruto Uzumaki In The Manga: How The Original Source Material Shaped The Character
Online Game
Why Online Game Promotions Make Digital Entertainment More Engaging
Geek Appeal of Randomized Games
The Geek Appeal of Randomized Games Like Pokies

Business & Marketing

Top Sustainable Home Decor Brands Worth Buying From
Sustainable Home Decor Brands You’ll Love in 2026
Trade Show Exhibit Trends 2026: Custom, Rental & Portable Designs That Steal the Spotlight
Trade Show Exhibit Trends 2026: Custom, Rental & Portable Designs That Steal the Spotlight
China EV Market Dominance: How China Leads Global EV Growth
How China Is Dominating The Global EV Market
Top 10 Productivity Apps for Remote Workers
10 Essential Remote Work Productivity Tools You Should Use
Emerging E-Commerce Markets
Top Emerging Markets for E-Commerce Entrepreneurs

Technology & AI

fix Broken Dependencies In Ubuntu/Linux
How To Fix Broken Dependencies In Ubuntu/Linux: The Ultimate Guide
how to resolve Git Merge Conflicts
How To Fix Git Merge Conflicts Step-By-Step Guide
Npm ERR! Cannot Find Module error fixing
How To Fix 'npm ERR! Cannot Find Module' Error: Causes and Step-by-Step Guide
Top Back-End Technologies for Web Development in 2025
Top Back-End Technologies for Web Development in 2026
How to Build a REST API with Node.js and Express
How to Build a REST API with Node.js and Express [Step-by-Step Guide]

Fitness & Wellness

AI diagnostics startups in UK
The Future of Early Detection: Top 10 UK Startups Pioneering AI-Driven Diagnostics and Screening in 2026
Strengthen Immune System
How to Strengthen Your Immune System Year-Round
Everything You Need to Know About Intermittent Fasting
Everything You Need to Know About Intermittent Fasting
Smart Underwear
Smart Underwear Is Watching You. And You Let It
daily exercises for lower back pain
The Best Exercises for People With Lower Back Pain