The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive telling all federal civilian executive branch (FCEB) agencies to guard against attacks from the Russia-linked Midnight Blizzard hackers currently leveraging compromised Microsoft email accounts.Agencies affected by Midnight Blizzard’s (more commonly known as Nobelium) espionage hacking campaign have been directed to reset authorization credentials and take other security steps in response to stolen emails or passwords. CISA has not disclosed the number of involved agencies.Specifically, Emergency Directive (ED) 24-02 requires federal civilian agencies to analyze the content of exfiltrated emails and to secure privileged Microsoft Azure accounts.Reset credentials in associated applications and deactivate associated applications that are no longer of use to the agency. Review sign-in, token issuance and other account activity logs for users and services whose credentials were suspected or observed as compromised for potential malicious activity. Also by April 30, all affected agencies must take the following actions:Identify the full content of the agency correspondence with compromised Microsoft accounts and perform a cybersecurity impact analysis. For known or suspected authentication compromises identified through agency analysis, CISA said it will work with agencies on an updated timeline for completing these required actions. Agencies are required to provide a status update to CISA by May 1, 2024, and provide weekly updates on remediation actions for authentication compromises until completion. CISA said it will provide agencies with a reporting template and reporting instructions.The emergency directive came after CISA said it was investigating a data breach at business intelligence company Sisence. CISA has advised Sisense customers to reset their credentials.Since January 22, 2019, CISA has issued 14 Emergency Directives. Most recently, the agency issued ED 24-01 urging FCEB agencies to implement mitigations against two actively exploited zero-day flaws in Ivanti Connect Secure and Ivanti Policy Secure products.