hector_titucius [he/him]@hexbear.net to chapotraphouse@hexbear.netEnglish · 1 year ago🫡🫡🫡Link in descriptionhexbear.netimagemessage-square18fedilinkarrow-up157arrow-down10file-text
arrow-up157arrow-down1image🫡🫡🫡Link in descriptionhexbear.nethector_titucius [he/him]@hexbear.net to chapotraphouse@hexbear.netEnglish · 1 year agomessage-square18fedilinkfile-text
https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/
minus-squareblobjim [he/him]@hexbear.netlinkfedilinkEnglisharrow-up4·1 year agoThe article just says they signed authentication tokens which gave them access to outlook emails. I don’t think it was code signing that would let them distribute software, and that’s not what they were after.
minus-squaremustardman [none/use name]@hexbear.netlinkfedilinkEnglisharrow-up3·1 year agoThanks for actually reading the article o7
The article just says they signed authentication tokens which gave them access to outlook emails. I don’t think it was code signing that would let them distribute software, and that’s not what they were after.
Thanks for actually reading the article o7