The Microsoft Threat Intelligence Center has uncovered a wide-scale malicious email campaign by a group it associates with the 2020 compromise of the SolarWinds Orion platform, the center announced in a blog post yesterday. The federal Cybersecurity and Infrastructure Security Agency encourages organizations to review the blog post and apply the necessary mitigations.

The Biden administration in April officially attributed the compromise of the SolarWinds Orion platform to the Russian Foreign Intelligence Service (SVR), also known as APT 29, Cozy Bear, and The Dukes.

“This is a highly sophisticated ongoing attack being perpetrated by these nation-state actors,” said John Riggi, AHA senior advisor for cybersecurity and risk. “The field should be particularly focused on this threat as the phishing email identified by Microsoft in their alert appears to originate from USAID’s Office of American Schools and Hospitals Abroad.”

For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org.

Related News Articles

Headline
The Cybersecurity and Infrastructure Security Agency Oct. 15 released an emergency directive advising federal agencies to take stock of their F5 BIG-IP…
Headline
In part one of a new blog, John Riggi, AHA national advisor for cybersecurity and risk, and Scott Gee, AHA deputy national advisor for cybersecurity and risk,…
Perspective
Public
This week, the FBI issued an urgent warning to all users — including hospitals — of a critical security soft spot within Oracle’s E-Business Suite, stating “…
Headline
The Health Sector Coordinating Council Oct. 7 released its Sector Mapping and Risk Toolkit, created to help health care providers and other organizations…
AHA Cyber Intel
As of Oct. 3, 2025, 364 hacking incidents had been reported to the U.S. Department of Health and Human Services Office for Civil Rights, affecting over 33…
Headline
The AHA Oct. 6 released a Cybersecurity Advisory urging immediate action against a critical Oracle E-Business Suite vulnerability that is remotely exploitable…