threatintel
actor tracker
All actors

Storm-0558

storm-0558 · primary source: Microsoft · first observed 2023 · last observed 2023
CN · ChinaState-sponsoredHigh confidence

PRC-attributed intrusion set identified by Microsoft in July 2023 after it forged authentication tokens using a stolen Microsoft MSA consumer signing key, enabling access to the Exchange Online mailboxes of approximately 25 organizations including the U.S. State Department and Commerce Department. The Cyber Safety Review Board's April 2024 report concluded Microsoft's security culture was inadequate and that the intrusion was 'preventable'. Microsoft revoked the compromised key and migrated Exchange Online token signing to more secure infrastructure. The exact method by which the adversary obtained the signing key has not been fully disclosed publicly.

Aliases

None tracked.

Motivations

espionagecollection

Target sectors

governmentdiplomatictechnology

Target countries

USGB

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Storm-0558
  • China
  • espionage
  • collection
Infrastructure
Victim
  • government
  • diplomatic
  • technology
  • US
  • GB

MITRE ATT&CK techniques

Timeline

0 events
No timeline events recorded yet.

Indicators of compromise

0 indicators
No indicators of compromise have been cataloged for this actor yet.

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Storm-0558 — actor profile. Retrieved from https://threatintel.local/actors/storm-0558

no cited activity