Friday, February 28, 2025
HomeCyber AttackMicrosoft has Confirmed that they Were Compromised by the Lapsus$ Hacking Group

Microsoft has Confirmed that they Were Compromised by the Lapsus$ Hacking Group

Published on

SIEM as a Service

Follow Us on Google News

The Lapsus$ hacking group recently compromised one of Microsoft’s employees, which allowed the threat actors to steal parts of Microsoft’s source code. There is evidence of a destructive element within Microsoft Security teams’ efforts to track a large-scale social engineering campaign.

As a result, Microsoft Azure DevOps server source code (37GB) was recently released by the Lapsus$ hacking group, and Microsoft has tracked this group as DEV-0537.

The stolen source code which is released by the threat actors includes several internal projects of Microsoft for:-

  • Bing
  • Cortana
  • Bing Maps

An employee account at Microsoft has been compromised by Lapsus$, giving it limited access to the source code repository, confirmed by Microsoft itself.

https://twitter.com/ZeroLogon/status/1506078085178920960

Targets

A main characteristic of DEV-0537 is that it uses a pure extortion and destruction attack model without deploying ransomware. Initially, DEV-0537 started targeting organizations in the following countries:- 

  • The United Kingdom
  • South America

However, now the operators of this group have expanded their range to the global targets in the following sectors:-

  • Organizations in government
  • Technology
  • Telecom
  • Media
  • Retail
  • Healthcare
  • Cryptocurrency exchanges

Microsoft explained in an advisory:-

“No customer code or data was involved in the observed activities. Our investigation has found a single account had been compromised, granting limited access. Microsoft does not rely on the secrecy of code as a security measure and viewing source code does not lead to elevation of risk. The tactics DEV-0537 used in this intrusion reflect the tactics and techniques discussed in this blog.”

Methods Used to Compromise the Credentials

The main goal of the Lapsus$ hacking group is to gain access to corporate networks through compromised credentials, and below here we have mentioned all the methods used by them to compromise the credentials:-

  • By using the malicious Redline password stealer, secure sessions can be obtained and passwords can be stolen.
  • On criminal underground forums, buying credentials and session tokens is common.
  • An employee at a target organization is paid in return for access to credentials and approval of multi-factor authentication.
  • Finding exposed credentials in public code repositories.

Additionally, these credentials give the hacking group access to source code repositories on the following platforms:-

  • GitLab
  • GitHub
  • Azure DevOps

In addition to harvesting valuable data, the threat actors are then exploiting NordVPN connections to conceal their locations while executing destructive attacks on the infrastructure of victims to initiate the incident response. 

Recommendations

To protect against threats such as those posed by Lapsus$, Microsoft recommends the following measures:-

  • Make sure to enable or implement MFA.
  • Make sure your endpoints are healthy and trusted.
  • Make VPNs more secure by utilizing modern authentication methods.
  • Maintain and strengthen the security of your cloud environment.
  • Awareness of social engineering attacks should be improved.
  • In response to the DEV-0537 intrusions, implement operational security processes.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software...

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in...

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords

A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software...

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in...