232.48 +0.88 (0.38%)
After hours: 7:59PM EST
|Bid||232.24 x 800|
|Ask||232.17 x 1100|
|Day's range||226.49 - 233.27|
|52-week range||132.52 - 246.13|
|Beta (5Y monthly)||0.81|
|PE ratio (TTM)||34.53|
|Earnings date||27 Apr 2021 - 03 May 2021|
|Forward dividend & yield||2.24 (0.99%)|
|Ex-dividend date||17 Feb 2021|
|1y target est||273.43|
(Bloomberg) -- Newly discovered flaws in Microsoft Corp.’s software for email have raised concerns at the highest levels of the U.S. government, which is urging users to immediately apply patches.At least 30,000 organizations across the U.S., including significant numbers of small businesses and local governments, have been hacked via holes in Microsoft’s email software in the last few days by suspected Chinese attackers who are focused on stealing email from victims, the blog KrebsonSecurity reported Friday.“This is a significant vulnerability that could have far-reaching impacts,” said Jen Psaki, the White House press secretary, speaking at a briefing. “We are concerned there are a large number of victims.” She characterized the incident as an “active threat.”Her remark comes after Microsoft disclosed on Tuesday that nation-state hackers based in China were exploiting previously unknown flaws in on-premise versions of the software and released patches for them. The following day, the Cybersecurity and Infrastructure Security Agency, which is known as CISA and is part of the Department of Homeland Security, issued an emergency directive in response to “observed active exploitation of these products.” As a result, civilian agencies and departments were directed to apply the patches, or disconnect Microsoft Exchange from their networks, and to look for compromises.Government concern over the flaws continued to build over the course of the week. On Thursday, CISA released an alert stating that it was aware of hackers using tools to search for servers that hadn’t yet been patched. That evening, National Security Advisor Jake Sullivan wrote on Twitter that the U.S. is “closely tracking Microsoft’s emergency patch.” He cited “reports of potential compromises of U.S. think tanks and defense industrial base entities.”The specific targets and timing of the hacking remains unknown. Defense Department spokesman John Kirby said the Pentagon is assessing its systems based on Microsoft’s advisory. The cybersecurity firm FireEye Inc. found that victims included “U.S.-based retailers, local governments, a university, and an engineering firm.” The version of exchange targeted by hackers is typically run by small businesses, putting them at special risk, according to Allan Liska, an analyst at the firm Recorded Future Inc..A Microsoft representative said the vulnerabilities were disclosed to the company in early January. Microsoft isn’t aware of attacks before then, the representative said.The cybersecurity firm Volexity reported finding attacks leveraging the flaws that date back to as early as Jan. 6. However, CISA urged operators to look for compromises dating back to September, “out of an abundance of caution,” according to a spokesperson.(Updates with additional details starting in the fifth paragraph.)For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2021 Bloomberg L.P.
Cloud computing is seeing increasing usage globally as it enables data interoperability in a scalable and cost-efficient way through data collection, processing and analyzing.
More than 20,000 U.S. organizations have been compromised through a back door installed via recently patched flaws in Microsoft Corp's email software, a person familiar with the U.S. government's response said on Friday. The hacking has already reached more places than all of the tainted code downloaded from SolarWinds Corp, the company at the heart of another massive hacking spree uncovered in December. The latest hack has left channels for remote access spread among credit unions, town governments and small businesses, according to records from the U.S. investigation.