Bonum Certa Men Certa

Unwarranted Media Hysteria Over (Allegedly) China Almost Sneaking Compromised xz Into Stable, Production Operating Systems (It Failed) While the US Government Blames Microsoft for Allowing China to Break Into Vital Government Systems Via Windows

posted by Roy Schestowitz on Apr 03, 2024

Shifting attention much, Microsoft-funded media? Microsoft: my dog ate my homework. So what if our whole internal infrastructure and all of Azure got compromised? "LOOK OVA' THAR!"

Beautiful white and brown dog lying under the table

THIS morning we wrote about how nearly 2 decades ago rms (Richard Stallman), who had given public talks about GNU since the mid-80s, warned that proprietary operating systems like Windows were a "back door" threat and, to make matters worse, you would not even know, no matter if that got detected or not (this already happened to Microsoft) [1, 2].

The "mainstream" (corporate, advertisers-funded and typically oligarch-owned) media won't mention any of this and instead it has helped distract from severe Microsoft Exchange issues. There is now a follow-up (see [1-4] below), but the media is shifting attention to "Linux" and it blames "Open Source" because some random user on Microsoft's GitHub (proprietary) pulled off a social engineering attack, aided by Microsoft systemd (also GitHub) and made "famous" by a Microsoft employee.

"Not only is there the 17k Microsoft Exchange server problem," an associate notes this morning, "but there is also the recent report excoriating Microsoft over its mishandling of the China-origin breach of its infrastructure."

See the links below.

"Allegedly" in the title of this post is because (while China is confirmed for the Microsoft breach) we don't even know what happened to xz. GitHub (Microsoft) makes it harder by hiding the evidence. The issue here or the culprit remains unattributed, an associate has said. "Red China is as likely as Israel, Russia, Netherlands, or US."

"However, in the other break-in [Microsoft], it is directly attributable to Red China."

Funnily enough, the corruptible media portrays the source of the FUD, Microsoft, as the saviour here. As if a campaign of misinformation or strategically-timed drama is something to be commended/praised for.

We're collectively paying the price for having very bad media/press. Media standards in the West have fallen closer to Red China's levels.

  1. Scathing federal report rips Microsoft for shoddy security, insincerity in response to Chinese hack

    In a scathing indictment of Microsoft corporate security and transparency, a Biden administration-appointed review board issued a report Tuesday saying “a cascade of errors” by the tech giant let state-backed Chinese cyber operators break into email accounts of senior U.S. officials including Commerce Secretary Gina Raimondo.

    The Cyber Safety Review Board, created in 2021 by executive order, describes shoddy cybersecurity practices, a lax corporate culture and a lack of sincerity about the company's knowledge of the targeted breach, which affected multiple U.S. agencies that deal with China.

  2. Cyber review board blames cascading Microsoft failures for Chinese hack

    The CSRB lays the blame for the incident squarely on Microsoft: “The Board concludes that this intrusion should never have happened. Storm-0558 was able to succeed because of a cascade of security failures at Microsoft.”

    The report represents the conclusion of a seven-month review and comes against the backdrop of growing concern in Washington that a series of severe breaches at Microsoft has made the company a national-security liability at a time when the federal government is increasingly relying on that company for a raft of cloud computing services. In January, Microsoft disclosed the latest such incident, in which Russian hackers were able to access emails belonging to senior company officials and company source code.

  3. Microsoft slammed for lax infosec that led to Exchange crack

    A review of the June 2023 attack on Microsoft's Exchange Online hosted email service – which saw accounts used by senior US officials compromised by a China-linked group called "Storm-0558" – has found that the incident would have been preventable save for Microsoft's lax infosec culture and sub-par cloud security precautions.

    The review, conducted by the US government's Cybersecurity and Infrastructure Security Agency's Cyber Safety Review Board (CSRB), calls for "rapid cultural change" at Microsoft. Among the Board's recommendations: [...]

  4. Review of the Summer 2023 Microsoft Exchange Online Intrusion [PDF]

    In May and June 2023, a threat actor compromised the Microsoft Exchange Online mailboxes of 22 organizations and over 500 individuals around the world. The actor—known as Storm-0558 and assessed to be affiliated with the People’s Republic of China in pursuit of espionage objectives—accessed the accounts using authentication tokens that were signed by a key Microsoft had created in 2016. This intrusion compromised senior United States government representatives working on national security matters, including the email accounts of Commerce Secretary Gina Raimondo, United States Ambassador to the People’s Republic of China R. Nicholas Burns, and Congressman Don Bacon.

    Signing keys, used for secure authentication into remote systems, are the cryptographic equivalent of crown jewels for any cloud service provider. As occurred in the course of this incident, an adversary in possession of a valid signing key can grant itself permission to access any information or systems within that key’s domain. A single key’s reach can be enormous, and in this case the stolen key had extraordinary power. In fact, when combined with another flaw in Microsoft’s authentication system, the key permitted Storm-0558 to gain full access to essentially any Exchange Online account anywhere in the world. As of the date of this report, Microsoft does not know how or when Storm-0558 obtained the signing key.

    This was not the first intrusion perpetrated by Storm-0558, nor is it the first time Storm-0558 displayed interest in compromising cloud providers or stealing authentication keys. Industry links Storm-0558 to the 2009 Operation Aurora campaign that targeted over two dozen companies, including Google, and the 2011 RSA SecurID incident, in which the actor stole secret keys used to generate authentication codes for SecurID tokens, which were used by tens of millions of users at that time. Indeed, security researchers have tracked Storm-0558’s activities for over 20 years.

Other Recent Techrights' Posts

Almost 5,000 Known Gemini Capsules
It is now just 98 short of 5k
If You Value Privacy, Follow the Likes of Eben Moglen, Phil Zimmermann, and Richard Stallman, Not Back Doors' Boosters Who Mislabel Themselves as Security Experts
Signal is not really secure
Writer's Block is Not a Problem to Us, Only a Lack of Time
Or timewasting by aggressive militants who try to silence us [...] People who experience writer's block very often find it depressing (it feels unproductive) and sometimes come to the conclusion that perhaps writing isn't for them
 
Apple Doesn't Want Anybody to Ask What Happened to Vision Pro
They lost a lot of money
Solicitors Regulation Authority (SRA) on Slop and Breach of Confidentiality
They should absolutely not ignore this
If You Want More Verifiable (Auditable) Security, Use GNU Linux-Libre
GNU/Linux will never be 100% secure
Microsoft XBox Can't Stop Talking About Slop
Will we see more "prepared" (under embargo) Microsoft propaganda released simultaneously at 9PM tonight?
Rust Will Not Inherit the Earth, It Barely Deserves a Place on the Planet
Rust - like Haskell and many other short-lived fetishes - will come and go
Truth Versus Fiction: IBM's Collapse Due to Money Crunch, Not Slop Disguised as Code
core issue is financial
Priceless leaks found in crowdfunding campaign
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, February 26, 2026
IRC logs for Thursday, February 26, 2026
[Video] "New RMS [Richard Stallman] Positive Media" Reaches Millions of Viewers This Week
Assuming 5+ million people will watch this on the first week, that's good publicity for the Free software movement
Another Quiet Slop Day Passes By
the number of slopfarms we can locate/track is fast decreasing
Gemini Links 26/02/2026: Sending a Thesis and Lupa/Onion ("Lupa now lists Gemini .onion addresses")
Links for the day
Links 26/02/2026: Bcachefs Man Bonkers, "Seven Journalists Convicted for Taking Photos at Courtroom"
Links for the day
Links 26/02/2026: "Peak Mental Sharpness" and "The Whole Economy Pays the Amazon Tax"
Links for the day
"Community" Site Deleted by Jeffrey Epstein-Connected 'Linux' Foundation Had Interview Where Eben Moglen Spoke of GPLv3 and of DRM, Back Doors Etc.
Deleting what happened or what was said two decades ago
Richard Stallman (Free Software Foundation) and Eben Moglen (Columbia Law School) Explained 25 Years Ago That Proprietary Software (and Proprietary Firmware) Would Lead to Back Doors
a fortnight after the 9/11 terror attacks in the US
Giving to the Community Versus Taking From the Community (or Worse, Attacking the Community)
some people bring no contributions, only harm
LLM Slop Will Try to 'Rewrite' History of UNIX and GNU/Linux
We occasionally see slopfarms spreading misinformation about UNIX, GNU, and Linux
March Plans for Techrights
next month we plan to start the series about how the SRA failed
Where Does the Solicitors Regulation Authority (SRA) Stand on Machine-Generated Legal Documents and Copy-pasting One Client's Lawsuit to Start Another (for American Serial Strangler)?
Now that many law firms cheat (copypasta, paper DOoS, LLM slop, breaches of rules, even defaming the other side) the SRA cannot keep up
Of Course Android is Not Free Software
That Android is not about freedom should not be so shocking
Talking About Blackboxes
Having just reposted a couple of articles from Alex Oliva
Microsoft Slop is Already Killing XBox
Microsoft will fail at alleviating such concerns
Two Weeks Have Passed and It Looks Like Conde Nast's Ars Sloppica Sacked "Senior" "AI" "Reporter" Benj Edwards But Did Not Remove All His LLM-Produced 'Articles'
the editorial standards at Conde Nast's Ars Sloppica are a joke
Alex Oliva (GNU Linux-Libre): Stricter is Less Popular
Reprinted with permission from Alex Oliva
Fraud and Crimes at Microsoft
A lot of these American companies simply cheat and even bribe
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, February 25, 2026
IRC logs for Wednesday, February 25, 2026
FSF's Alex Oliva on Hardware Black Boxes
Reprinted with permission from Alex Oliva
What Microsoft Hides Underneath
In recent years a lot of this shell game was played via "Open" "AI" [sic]
A Lot of Slopfarms Died, Google News Feeds the Few Which Survived and Still Target "Linux"
Many just simply died
Links 25/02/2026: Fifth Year of War in Ukraine, Dihydroxyacetone Man Looking to Start More Wars
Links for the day
Gemini Links 25/02/2026: Retired a Year, Illness, Losing a Lung, and "Back to Gemini"
Links for the day
The Register MS Published a Ponzi Scheme-Boosting Fake Article This Morning. It Mentions "AI" 30 Times.
Will credibility be left after the bubble pops entirely?
They Try to Ruin Linux, Too ("Attestation" in GNU/Linux)
In the context of Web browsers, this isn't unprecedented and we wrote a lot about it
Mozzarella Company: All Our Cheese Comes With Mold Now, But You Can Ask the Seller to Remove the Mold
If you reject and oppose slop, do not download/use Firefox
Stallman Was Right About Back Doors
I had some conversations with Dr. Stallman about security and back doors
Australian Signals Directorate ex-employee sold back doors to Russia
Reprinted with permission from Daniel Pocock
IBM Debt-Loading and Liability (Toxic Asset) Offloading
One can hope that IBM will be subjected to the same attention Kyndryl received, but this boils down to politics
Links 25/02/2026: 'Hybrid Warfare' and "Boycott the State of the Union"
Links for the day
IBM (and Red Hat) Can Disappear in the Coming Years, Along With Kyndryl (Debt Twice as Big as Its 'Worth')
No wonder Red Hat workers tell us they hate IBM
Software Freedom is Science, But It Also Sustains Life
In some sense, Software Freedom can be explained in the context of nourishing people
“Xbox, like a lot of businesses that aren’t the core AI business, is being sunsetted."
There has been a lot of narrative control lately, including at 9PM on a Friday
3,300 Capsules Known to Lupa and Currently Accessible
Gemini Protocol turns 7 this summer
When it Comes to Firmware, the FSF and Its Founder RMS Won the Argument (But Not the Fight, Yet)
The "whataboutism" tactics are physiological manipulation means of discouraging those who move in the correct direction
Austria Tackles Digital Weapon Disguised as "Social" and/or "Media"
Are we seeing the end days of Social Control Media?
Nothing Over the Horizon for XBox
XBox is not even being sold in many places anymore
Solicitors Regulation Authority (SRA) Contradicting Itself: You Can Use Slop to Cheat Clients, But You Can Also Face Disciplinary Actions Over Slop
Where does the SRA stand on the matter?
In Praise of Eben Moglen
Hopefully Professor Moglen will be with us for many decades to come and become an active speaker on issues such as Software Freedom
Sunsetting IBM (for the Benefit of Few Corrupt Officials and Wall Street Speculators)
IBM will not (and cannot) survive for much longer [...] The issue is bad leadership, not any particular nationality/race
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, February 24, 2026
IRC logs for Tuesday, February 24, 2026
Gemini Links 25/02/2026: Rise of Solar in 2025 and Smallnet Protocols
Links for the day