1 GOVERNMENT ORDERS UNINTERRUPTED GOAL TRANSPORTATION THROUGH GASHUUNSUKHAIT, KHANGI BORDER CROSSINGS WWW.MONTSAME.MN PUBLISHED:2026/02/26      2 CONCESSIONAL LOAN AGREEMENT SIGNED UNDER ‘WHITE GOLD’ NATIONAL MOVEMENT WWW.MONTSAME.MN PUBLISHED:2026/02/26      3 MONGOLIA MOVES TO NEXT STAGE OF COPPER SMELTER SELECTION PROCESS WWW.MONTSAME.MN PUBLISHED:2026/02/26      4 INVESTMENT OPPORTUNITY IN MONGOLIAN MINING INTRODUCED IN LONDON WWW.MONTSAME.MN PUBLISHED:2026/02/26      5 MONGOLIA SEEKS LONDON STOCK EXCHANGE LISTINGS FOR MINING COMPANIES WWW.MONTSAME.MN PUBLISHED:2026/02/26      6 TMK ENERGY SETS NEW GAS OUTPUT RECORD AT MONGOLIAN CSG PILOT WWW.TIPRANKS.COM PUBLISHED:2026/02/26      7 WILL MONGOLIA BAN SOCIAL NETWORKS FOR CHILDREN, AS AUSTRALIA AND FRANCE HAVE DONE? WWW.OPEN.KG PUBLISHED:2026/02/26      8 FOREIGN TRADE TURNOVER REACHES USD 2.6 BILLION WWW.MONTSAME.MN PUBLISHED:2026/02/25      9 MONGOLIA REVOKES PERMITS OF SIX FOREIGN NGOS WWW.MONTSAME.MN PUBLISHED:2026/02/25      10 MINING DRIVES MONGOLIA’S ECONOMY AS REFORM MOMENTUM BUILDS WWW.EASTASIAFORUM.ORG PUBLISHED:2026/02/25      БӨӨРӨЛЖҮҮТИЙН ЦАХИЛГААН СТАНЦ 300 САЯ АМ.ДОЛЛАРЫН САНХҮҮЖИЛТ АМЖИЛТТАЙ БОСГОЛОО WWW.ITOIM.MN НИЙТЭЛСЭН:2026/02/26     ГАДААДЫН 95 ИРГЭНИЙГ УЛСЫН ХИЛЭЭР ОРУУЛАЛГҮЙ БУЦААЖЭЭ WWW.MONTSAME.MN НИЙТЭЛСЭН:2026/02/26     ЗЭСИЙН БАЯЖМАЛ ХАЙЛУУЛАХ, БОЛОВСРУУЛАХ ҮЙЛДВЭРИЙН ХӨРӨНГӨ ОРУУЛАГЧИЙГ ИРЭХ ТАВДУГААР САРД ТОДРУУЛНА WWW.EAGLE.MN НИЙТЭЛСЭН:2026/02/26     УЛААНБААТАР-ЛҮНГИЙН ЗАМЫГ ЗУРГААН ЭГНЭЭ БОЛГОНО WWW.EAGLE.MN НИЙТЭЛСЭН:2026/02/26     ЖАЙКА БОЛОН МТҮП МЭДЭЭЛЭЛ ТЕХНОЛОГИЙН САЛБАРЫГ ХӨГЖҮҮЛЭХ ТӨСЛИЙГ ХЭРЭГЖҮҮЛЖ ЭХЭЛЛЭЭ WWW.EGUUR.MN НИЙТЭЛСЭН:2026/02/26     ЕРӨНХИЙ САЙДЫН АХЛАХ ЗӨВЛӨХ БӨГӨӨД АЖЛЫН АЛБАНЫ ДАРГААР Ж.САНДАГСҮРЭНГ ТОМИЛЖЭЭ WWW.ITOIM.MN НИЙТЭЛСЭН:2026/02/26     БАРАА БҮТЭЭГДЭХҮҮНИЙ ҮНЭ САРЫН ХУГАЦААНД 2.7 ХУВИАР ӨСЧЭЭ WWW.NEWS.MN НИЙТЭЛСЭН:2026/02/26     НИЙСЛЭЛ ЗАРДЛАА ТЭЛЖ, ТРАМВАЙН ТӨСӨЛД 350 ТЭРБУМЫГ ЗАРЦУУЛНА WWW.NEWS.MN НИЙТЭЛСЭН:2026/02/25     САНГИЙТ КАУР ДЕО: МАЛАЙЗЫН ТӨР БУРУУТАЙ ГЭДГИЙГ ШИЙДҮҮЛЭХ ЭЦСИЙН БОЛОМЖ УЧРААС МОНГОЛЫН ТӨР ХАМТРАН АЖИЛЛАХЫГ ХҮСЭЖ БАЙНА WWW.ITOIM.MN НИЙТЭЛСЭН:2026/02/25     НИЙСЛЭЛИЙН ТӨСӨВ: COP17 ХУРАЛД 70 ТЭРБУМ ЗАРЦУУЛЖ, 200 ТЭРБУМЫН БОНД БОСГОЖ V ЦАХИЛГААН СТАНЦ БАРИНА WWW.ITOIM.MN НИЙТЭЛСЭН:2026/02/25    
Англи амин дэм Монгол улсад албан ёсоор бүртгэгдлээ.

Global Hack Breaches Thousands of Microsoft Business Accounts www.bloomberg.com

A sophisticated attack on Microsoft Corp.’s widely used business email software is morphing into a global cybersecurity crisis, as hackers race to infect as many victims as possible before companies can secure their computer systems.
The attack, which Microsoft has said started with a Chinese government-backed hacking group, has so far claimed at least 60,000 known victims globally, according to a former senior U.S. official with knowledge of the investigation. Many of them appear to be small or medium-sized businesses caught in a wide net the attackers cast as Microsoft worked to shut down the hack.
Victims identified so far include banks and electricity providers, as well as senior citizen homes and an ice cream company, according to Huntress, a Ellicott City, Maryland-based firm that monitors the security of customers, in a blog post Friday.
One U.S. cybersecurity company which asked not to be named said its experts alone were working with at least 50 victims, trying to quickly determine what data the hackers may have taken while also trying to eject them.
The rapidly escalating attack drew the concern of U.S. national security officials, in part because the hackers were able to hit so many victims so quickly. Researchers say in the final phases of the attack, the hackers appeared to have automated the process, scooping up tens of thousands of new victims around the world in a matter of days.
“We are undertaking a whole of government response to assess and address the impact,” a White House official wrote in an email on Saturday. “This is an active threat still developing and we urge network operators to take it very seriously.”
Microsoft Server Flaws Raise Alarms at White House, DHS
The Chinese hacking group, which Microsoft calls Hafnium, appears to have been breaking into private and government computer networks through the company’s popular Exchange email software for a number of months, initially targeting only a small number of victims, according to Steven Adair, head of the northern Virginia-based Volexity. The cybersecurity company helped Microsoft identify the flaws being used by the hackers for which the software giant issued a fix on Tuesday.
The result is a second cybersecurity crisis coming just months after suspected Russian hackers breached nine federal agencies and at least 100 companies through tampered updates from IT management software maker SolarWinds LLC. Cybersecurity experts that defend the world’s computer systems expressed a growing sense of frustration and exhaustion.
‘Getting Tired’
“The good guys are getting tired,” said Charles Carmakal, a senior vice president at FireEye Inc., the Milpitas, California-based cybersecurity company.
Asked about Microsoft’s attribution of the attack to China, a Chinese foreign ministry spokesman said Wednesday that the country “firmly opposes and combats cyber attacks and cyber theft in all forms” and suggested that blaming a particular nation was a “highly senstive political issue.”
Both the most recent incident and the SolarWinds attack show the fragility of modern networks and sophistication of state-sponsored hackers to identify hard-to-find vulnerabilities or even create them to conduct espionage. They also involve complex cyberattacks, with an initial blast radius of large numbers of computers which is then narrowed as the attackers focus their efforts, which can take affected organizations weeks or months to resolve.
In the case of the Microsoft bugs, simply applying the company-provided updates won’t remove the attackers from a network. A review of affected systems is required, Carmakal said. And the White House emphasized the same thing, including tweets from the National Security Council urging the growing list of victims to carefully comb through their computers for signs of the attackers.
Initially, the Chinese hackers appeared to be targeting high value intelligence targets in the U.S., Adair said. About a week ago, everything changed. Other unidentified hacking groups began hitting thousands of victims over a short period, inserting hidden software that could give them access later, he said.


Published Date:2021-03-07