Threat actors unsuccessfully attempted to read CrowdStrike emails
Cybersecurity company CrowdStrike was warned by Microsoft team that hackers tried to read the company's emails using a compromised Microsoft Azure credentials. CrowdStrike has performed an investigation and found no signs of SolarWinds breach and the connection between the attacks. According to sources close to the investigation, the compromised reseller account had attempted to enable Office 365 'Read' privileges to access CrowdStrike email but failed because the company doesn't use Office 365. CrowdStrike have analyzed their Azure environment found it not compromised. To make it easier for administrators to analyze their Microsoft Azure environment, CrowdStrike has released a free CrowdStrike Reporting Tool for Azure (CRT) tool. Read more...