> They did this by using forged authentication tokens to access user email using an acquired Microsoft account (MSA) consumer signing key
Is this saying that the attackers got Microsoft's cookie signing private key? I don't know how else to interpret it, but "acquiring" sure ain't the language you use for that level of breach. And how was the key "acquired"? From a security vulnerability in their production systems? Breach of their corp network?
> The actor exploited a token validation issue to impersonate Azure AD users and gain access to enterprise mail.
So not only did they leak the private key, but their validation code was also broken and checked the signatures against the wrong key? How does that even happen?
[0] https://msrc.microsoft.com/blog/2023/07/microsoft-mitigates-...
Devastating to commerce? Sure! For a day or so. Then the Chinese cyberattacks would cease and we could go back to normal.
How could you tell? Well, there are countless websites that purport to graph such things realtime. Ask one of them to monitor the situation. It goes above a trivial threshold - the pipe is shut off for a day.
But that's just a naieve citizen, wondering why government is so screwed up that it allows constant unrelenting financial attacks against its people without repercussions.
I think the scope of Chinese malfeasance may be underestimated here. It's constant and malicious. Some kind of negative feedback, any kind, would likely have an immediate response.