Tuesday, March 4, 2025
HomeData BreachMicrosoft Hacked - Hackers Compromised The Microsoft Employee's Account to Gain Access...

Microsoft Hacked – Hackers Compromised The Microsoft Employee’s Account to Gain Access the Customers Email

Published on

SIEM as a Service

Follow Us on Google News

Microsoft announced a data breach by unknown hackers who have compromised the Microsoft technical support agent’s credentials and gain access to some of the Microsoft customer’s Email.

Cybercriminals breached the Microsoft network between January 1 and March 28 and compromise the Microsoft support agent’s credentials.

Microsoft notified to the customer via Email on Friday said, “This unauthorized access could have allowed unauthorized parties to access and/or view information related to your email account (such as your e-mail address, folder names, the subject lines of e-mails, and the names of other e-mail addresses you communicate with), but not the content of any e-mails or attachments”

It was unclear that how many of the Microsoft customers emails were accessed by attackers and also Microsoft didn’t reveal any details regarding the employee whether he/she was a direct employee or the person who worked for third party providing support services, TechCrunch Said.

Microsoft immediately disabled the compromised credentials as soon as Microsoft learned this cyber incident, and stopped them to move into any other unauthorized access.

Also, Microsoft warned to the customers,” as a result of this incident, you may receive phishing emails or other spam emails. You should be careful when receiving any e-mails from any misleading domain name, any e-mail that requests personal information or payment, or any unsolicited request from an untrusted source “

Microsoft confirmed that the attackers viewed some of the account-related information, but they unclear why that perticular information was viewed or how it may have been used.

None of the Microsoft outlook customers directly affected by this incident
however, as a security practice, customers are strongly recommended to reset password for your account.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Unpatched Internet Explorer Zero-day Vulnerability Lets Attackers Hack Windows PC & Steal Files

Microsoft Released Security updates & Fixed 74 Vulnerabilities Including 2 Latest Zero-day

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector

A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Microsoft Removing DES Encryption from Windows 11 24H2 and Windows Server 2025″

Microsoft has announced the removal of the Data Encryption Standard (DES) encryption algorithm from...

Hackers Exploit Microsoft Teams & Quick Assist for Remote Access

Cybersecurity researchers have uncovered a sophisticated campaign in which threat actors are exploiting Microsoft...