• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

War Room

Shells From Above

RSM logo

  • Home
  • About
  • Blog
  • Talks/Whitepapers
  • Tools
  • Recreation
Home > Defense > RSM Defense > Threat Intelligence > Microsoft and HPE targeted by Cozy Bear in seemingly unrelated attacks

Microsoft and HPE targeted by Cozy Bear in seemingly unrelated attacks

January 29, 2024 By Morgan Kennedy

Over the past week, Microsoft and Hewlett Packard Enterprise (HPE) disclosed successful campaigns targeting the organizations by Russian-based threat actor Cozy Bear (aka Midnight Blizzard, aka APT29). Both campaigns conducted successfully obtained access to emails for both companies, including emails for senior leadership and cybersecurity positions.  Neither Microsoft nor HPE believe the attacks were related to one another, however both incidents are still under investigation. At the time of this writing, Microsoft has released the tactics utilized to access the information, however HPE has not yet released said details.

Microsoft reported the company’s breach in an SEC 8-K filing on January 17, 2024, claiming the attack reportedly started in late November 2023. During the attack, threat actors utilized a password spray attack to compromise a legacy non-production test tenant account. From that account, threat actors were able to use the account’s permissions to access a “small percentage” of corporate email accounts belonging to senior leadership team members and employees in cybersecurity and legal positions. The threat actors managed to steal “some” emails and attached documents to said emails. Microsoft reportedly remove the threat actor’s access to the email accounts “on or about January 13, 2024.” Microsoft claimed there is no evidence of the threat actor accessing customer environments, production systems, source code, or AI systems, but Microsoft plans to continue its investigation. It is of note that the attack did not the result of a vulnerability in Microsoft products or services.

HPE’s breach was disclosed in a SEC 8-K filing on January 24, 2024, in which the company claimed that it was notified of a “suspected nation-state actor, believed to be the threat actor Midnight Blizzard, had gained unauthorized access to HPE’s cloud-based email environment” on December 12, 2023. The threat actors are believed to have gained unauthorized access and were able to exfiltrate data from mailboxes belonging to individuals in the cybersecurity, go-to-market, business segments, and other functions within the company. HPE believes the incident is related to a previous incident in which threat actors gained unauthorized access to the company’s SharePoint server and stole files. HPE’s investigation into the incident remains ongoing.

Sources: (1) (2) (3)

Morgan Kennedy

Primary Sidebar

Categories

  • Defense
  • Forensics
  • Offense
  • Physical
  • R&D

Most Viewed Posts

  • DLL Injection Part 1: SetWindowsHookEx 11.1k views
  • Sophos UTM Home Edition – 3 – The Setup 10.9k views
  • Leveraging MS16-032 with PowerShell Empire 10.1k views
  • Bypassing Gmail’s Malicious Macro Signatures 10k views
  • How to Bypass SEP with Admin Access 9.1k views

Footer

  • Facebook
  • LinkedIn
  • Twitter
  • Tools
  • About
  • RSM US LLP

(312) 634-3400

30 S. Wacker Drive Suite 3300
Chicago, IL 60606

Copyright © 2026 RSM US LLP. All rights reserved. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit for more information regarding RSM US LLP and RSM International.