Microsoft: Iranian Hackers Targeted Email Accounts of Presidential Campaign, U.S. Officials

Microsoft: Iranian Hackers Targeted Email Accounts of Presidential Campaign, U.S. Officials

Over 200 accounts were targeted by the group of hackers, but only four were compromised, according to Microsoft.

A group of hackers believed to be linked to the Iranian government has targeted hundreds of email accounts, some of which are associated with an American presidential campaign, Microsoft announced Friday.

During a 30-day period in August and September, Microsoft’s threat intelligence recognized significant activity by a threat group they call Phosphorus. The hacking collective made more than 2,700 attempts to identify email accounts belonging to Microsoft customers and then targeted 241 of them. 

The accounts belonged to a range of public figures, including current and former government officials, journalists cover world politics, prominent Iranians who live outside of the country, and people working for a U.S. presidential campaign. Microsoft declined to identify the specific campaign. 

Of those accounts, the company said only four were compromised and that none of them belonged to the presidential campaign or government officials. All customers who were attacked have been notified, according to a blog posted by Tom Burt, Microsoft’s vice president of customer security and trust.

The hackers attempted to use password reset or account recovery features to take over some targeted accounts. Burt wrote that although the attacks were not “technically sophisticated,” the hackers attempted to use a significant amount of personal information to identify accounts belonging to their targets and then attempt to compromise them. 

“This effort suggests Phosphorus is highly motivated and willing to invest significant time and resources engaging in research and other means of information gathering,” Burt wrote. “As we’ve previously disclosed, our Digital Crimes Unit has also taken legal and technical steps to combat Phosphorus attacks and we continue to take these types of actions.” 

Chris Krebs, who serves as the director of the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency, told NBC News that the government was trying to understand the severity of the attack. 

"While much of this activity can likely be attributed to run-of-the-mill foreign intelligence service work, Microsoft’s claims that a presidential campaign was targeted is yet more evidence that our adversaries are looking to undermine our democratic institutions,” Krebs said. 

The company said that it was sharing the attack for two reasons: to be more transparent about attacks that intend to disrupt democratic processes, and to encourage better cybersecurity practices by public figures in the government and media. 

“Publishing this information should help others be more vigilant and take steps to protect themselves,” Burt wrote. 

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.