Chinese Hackers Got Access to Western European Governments Emails

Microsoft updates ChatGPT for Privacy

According to Microsoft Corp. emails connected to Western European government agencies have been compromised by a hacker gang based in China.

Microsoft stated in a blog post on Tuesday that the Storm-0558 gang specializes in crimes like data theft and espionage.

The gang had gone undetected for nearly a month until customers complained to Microsoft about unusual mail activity. The group had gotten access to email accounts affecting roughly 25 businesses, including government institutions, and to accounts of individuals associated to these organizations.

“We assess this adversary is focused on espionage, such as gaining access to email systems for intelligence collection,” Charlie Bell, executive vice president of security at Microsoft, stated in a separate Microsoft post.

The breach was caused by hackers creating fake authentication tokens, which are bits of data used to confirm a user’s identity and are necessary to access email accounts. Since then, Microsoft has addressed the incident and contacted any impacted customers.

Microsoft claimed that, among other organizations, it collaborates with the Department of Homeland Security and the Cybersecurity and Infrastructure Security Agency to thwart such assaults.

Additionally, it declared that it will keep an eye on Storm-0558’s operations.

The Storm-0558 attack is the most recent security lapse that has been linked to hackers in China.

An email security program with a well-known security flaw was used by suspected state-backed Chinese hackers to breach the networks of hundreds of public and private sector companies worldwide, according to Mandiant, a Google-owned cybersecurity company.

Microsoft claimed earlier this year that state-sponsored Chinese hackers have been attacking vital American infrastructure and may be setting the technical stage for the potential interruption of vital communications between the United States and Asia in the event of future crises.

China claims that the U.S. hacks into the systems of its colleges and businesses as part of its cyberespionage campaign against it.


Subscribe to Our Newsletter

Related Articles

Top Trending

work-life balance guide
How To Create Work-Life Balance Without Sacrificing Ambition: The Ultimate Guide!
flexible work Australia
13 Things Every Reader Must Know About How Aussie Companies Are Using Flexible Work as the Ultimate Talent Magnet
Study Medicine Abroad on a Budget
Top 8 Best Countries for Canadian Students to Study Medicine Abroad on a Budget
Bank Accounts with Low Monthly Fee
The 10 Best South African Bank Accounts with Zero or Low Monthly Fees in 2025
Future of Dating Apps 2026
Love on Airplane Mode: Why 2026 Dating Apps and Relationships are Turning Hyper-Intentional 

Fintech & Finance

How Small Businesses Use Credit Cards for Early Expenses
How Small Businesses Use Credit Cards for Early Expenses
Best High Yield Savings Accounts 2026
10 Best American High-Yield Savings Accounts Beating Inflation in 2026
TSX investing guide for Canadians
7 Critical Facts About TSX Investing Guide for Canadians
Consumer Data Right Australia
12 Essential Facts About How Australia's Consumer Data Right Is Transforming Open Banking
best canadian travel credit cards 2026
8 Best Canadian Credit Cards for Travel Rewards Compared in 2026

Sustainability & Living

sustainable meal prep
Sustainable Meal Prep: Containers, Tools, And Waste Reduction At Home!
Luxury Resale Market
Secondhand Is the New Status Symbol: Why Gen Z Is Quietly Rewriting Luxury
Solar Panels Increase Home Resale Value
How Solar Panels Affect Your Home's Resale Value
Solar vs Coal
How Solar Energy Is Becoming Cheaper Than Coal
UK Blockchain Food Traceability Startups
12 UK Blockchain Solutions Ensuring Complete Farm-to-Fork Traceability

GAMING

Why is Pokémon still popular?
Why Is Pokémon Still Popular and How It Continues To Captivate New Generations!
Top 10 Video Games You Must Play Before You Die
Top 10 Video Games You Must Play Before You Die
How Cloud Gaming Is Changing Mobile Experiences
How Cloud Gaming Is Changing Mobile Experiences
The Rise of Hyper-Casual Games What's Driving Downloads
Hyper-Casual Games Growth: Key Drivers Behind Massive Downloads
M&A in Gaming
Top 10 SMEs Specializing in M&A in Gaming in USA

Business & Marketing

work-life balance guide
How To Create Work-Life Balance Without Sacrificing Ambition: The Ultimate Guide!
flexible work Australia
13 Things Every Reader Must Know About How Aussie Companies Are Using Flexible Work as the Ultimate Talent Magnet
Americas unionization wave
12 Critical Facts About America's Unionization Wave
How Small Businesses Use Credit Cards for Early Expenses
How Small Businesses Use Credit Cards for Early Expenses
Navigating Transformation and Inclusion
10 Key Ways South African Corporates Are Navigating Transformation and Inclusion

Technology & AI

Future of Dating Apps 2026
Love on Airplane Mode: Why 2026 Dating Apps and Relationships are Turning Hyper-Intentional 
Midjourney v7 vs Flux 1.1 Pro vs DALL-E 4
Midjourney v7 vs Flux 1.1 Pro vs DALL-E 4: Which Is Better Performing
Why is Pokémon still popular?
Why Is Pokémon Still Popular and How It Continues To Captivate New Generations!
caregiver economy
The Caregiver Economy Is Bigger Than Big Tech: Why Founders Ignore It
Serverless Architecture: Pros, Cons, And Use Cases
Serverless Architecture: Pros, Cons, And Use Cases [The Ultimate Guide]

Fitness & Wellness

Mediterranean Diet
How The Mediterranean Diet Became The World's Healthiest?
Codependency Recovery Stages
What Codependency Really Means And How To Break Free: Escape the Cycle!
understanding Attachment Styles
Understanding Attachment Styles And How They Affect Relationships!
Digital Fitness Apps in Germany
Digital Fitness Apps in Germany: 15 Startups Turning Phones Into Personal Trainers 
modern therapy misconceptions
Why Therapy Is Still Misunderstood And How To Find The Right Help