hector_titucius [he/him]@hexbear.net to chapotraphouse@hexbear.netEnglish · 2 years ago🫡🫡🫡Link in descriptionhexbear.netimagemessage-square21fedilinkarrow-up161arrow-down10file-text
arrow-up161arrow-down1image🫡🫡🫡Link in descriptionhexbear.nethector_titucius [he/him]@hexbear.net to chapotraphouse@hexbear.netEnglish · 2 years agomessage-square21fedilinkfile-text
https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/
minus-squareblobjim [he/him]@hexbear.netlinkfedilinkEnglisharrow-up4·2 years agoThe article just says they signed authentication tokens which gave them access to outlook emails. I don’t think it was code signing that would let them distribute software, and that’s not what they were after.
minus-squaremustardman [none/use name]@hexbear.netlinkfedilinkEnglisharrow-up3·2 years agoThanks for actually reading the article o7
The article just says they signed authentication tokens which gave them access to outlook emails. I don’t think it was code signing that would let them distribute software, and that’s not what they were after.
Thanks for actually reading the article o7