New Delhi:- Microsoft still doesn't know, nor does it intend to publish, how China-backed hackers stole a key that could covertly compromise dozens of email inboxes, including those of multiple federal agencies. do not have. In a blog post on Friday, Microsoft explained how it obtained a Microsoft signing key that has been exploited to forge authentication tokens that allow hackers to access inboxes as if they were the rightful owner. It said there was an "ongoing investigation" into whether. Targets reportedly include US Secretary of Commerce Gina Raimondo, US State Department officials, and other organizations that have not yet been made public. Microsoft announced the incident last Tuesday, announcing that the months of activity were attributed to a newly discovered spy group called Storm-0558 with strong ties to China. The hack, which began in mid-May, affected a single-digit number of government accounts, and hackers allegedly filtered some unclassified email data, according to the US cybersecurity agency CISA. The U.S. government has not publicly held responsibility for the hack, but China's top foreign ministry spokesman on Wednesday dismissed the allegations. Also Read:- Russia conducts airstrikes on Ukraine's South and East, according to the Ukrainian Air Force Where China has used previously unknown vulnerabilities to individually hack into Microsoft-powered email servers to steal corporate data, this hacking group instead went directly to the source by targeting new and undisclosed vulnerabilities in Microsoft's cloud. In its blog post, Microsoft said the hackers acquired one of its consumer signing keys, or MSA key, which the company uses to secure consumer email accounts, like for accessing Outlook.com. Microsoft said it initially thought the hackers were forging authentication tokens using an acquired enterprise signing key, which is used to secure corporate and enterprise email accounts. But, Microsoft found that the hackers were using that consumer MSA key to forge tokens that allowed them to break into enterprise inboxes. Microsoft said this was because of a “validation error in Microsoft code.” Microsoft said it has blocked “all actor activity” related to this incident, suggesting that the incident is over and that the hackers lost access. It's unclear how Microsoft lost control of its keys, but the company said it hardened its key-issuing system, presumably to prevent hackers from creating new digital skeleton keys. Also Read:- China Unveils its First Open-Source Computer Operating System Hackers made a grave mistake. By searching multiple inboxes using the same key, investigators were able to "see all access requests from attackers following this pattern on both our corporate and consumer systems.” said Microsoft. Microsoft knows who has been compromised and has notified those affected. With the immediate threat believed to have passed, Microsoft is now tough on its response to what is believed to be the largest breach of unclassified government data since the Russian espionage effort that hacked SolarWinds in 2020. As Ars Technica's Dan Goodin pointed out, Microsoft has gone to great lengths to mitigate the damage in its own blog post, using terms like "zero-day" to refer to software vendors having zero days. and this vulnerability has already been exploited for remediation. Regardless of whether this flaw, or its exploitation, fits anyone's definition of a zero-day, Microsoft has made every effort not to label it as such, or even a vulnerability. Also Read:- Due to a contentious scene, the Barbie movie could be banned in many countries Complicating the critical breach and its exploitation is the lack of transparency into the intervention of the government agencies themselves, and Microsoft also said that by storing security logs for government accounts in its top-of-the-line package, it could be malicious. It is active and this may have helped other responders. You do it to recognize it. CNN originally reported that the State Department first discovered the breach and reported it to Microsoft. However, not all government agencies had the same level of security logging. According to the Wall Street Journal, it was only available to departments with high-paying Microsoft accounts and not others. Mary Jo Foley, editor-in-chief of Directions on Microsoft, a consulting firm that serves Microsoft customers, said in a blog post-Monday that lower levels of government provided some logging, but that "problems are clear. We did not track specific mailbox data to CISA officials criticized the lack of protocols available to reporters last week. Microsoft told the WSJ that it "values feedback." Microsoft's expanded reveal on Friday provided more technical details and a glimpse of compromise indicators that emergency responders can see if their network is under attack. But the tech giant still has questions to answer. Whether or not Microsoft has an answer, it's unlikely the tech giant will be able to abandon the investigation anytime soon. Also Read:- Microsoft New Job Cut Round, Letting Go of 276 Employees China after hacking the Emails of the United States of America on Microsoft is still ruling the problem that they created as Microsoft is not able to find the main key of the problem and are even lost the main key to all this malfunctioning going on.