Tuesday, May 13, 2025
HomeData BreachMicrosoft Hacked - Hackers Compromised The Microsoft Employee's Account to Gain Access...

Microsoft Hacked – Hackers Compromised The Microsoft Employee’s Account to Gain Access the Customers Email

Published on

SIEM as a Service

Follow Us on Google News

Microsoft announced a data breach by unknown hackers who have compromised the Microsoft technical support agent’s credentials and gain access to some of the Microsoft customer’s Email.

Cybercriminals breached the Microsoft network between January 1 and March 28 and compromise the Microsoft support agent’s credentials.

Microsoft notified to the customer via Email on Friday said, “This unauthorized access could have allowed unauthorized parties to access and/or view information related to your email account (such as your e-mail address, folder names, the subject lines of e-mails, and the names of other e-mail addresses you communicate with), but not the content of any e-mails or attachments”

- Advertisement - Google News

It was unclear that how many of the Microsoft customers emails were accessed by attackers and also Microsoft didn’t reveal any details regarding the employee whether he/she was a direct employee or the person who worked for third party providing support services, TechCrunch Said.

Microsoft immediately disabled the compromised credentials as soon as Microsoft learned this cyber incident, and stopped them to move into any other unauthorized access.

Also, Microsoft warned to the customers,” as a result of this incident, you may receive phishing emails or other spam emails. You should be careful when receiving any e-mails from any misleading domain name, any e-mail that requests personal information or payment, or any unsolicited request from an untrusted source “

Microsoft confirmed that the attackers viewed some of the account-related information, but they unclear why that perticular information was viewed or how it may have been used.

None of the Microsoft outlook customers directly affected by this incident
however, as a security practice, customers are strongly recommended to reset password for your account.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Unpatched Internet Explorer Zero-day Vulnerability Lets Attackers Hack Windows PC & Steal Files

Microsoft Released Security updates & Fixed 74 Vulnerabilities Including 2 Latest Zero-day

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Four Hackers Caught Exploiting Old Routers as Proxy Servers

U.S. authorities unsealed charges against four foreign nationals accused of operating a global cybercrime...

F5 BIG-IP Vulnerability Allows Remote Command Execution

Critical security vulnerability in F5 BIG-IP systems has been discovered that allows authenticated administrators...

Scattered Spider Launches Supply Chain Attacks on UK Retail Organizations

Scattered Spider, also known as Roasting 0ktapus and Scatter Swine, has emerged as a...

Hackers Abuse PyInstaller to Deploy Stealthy macOS Infostealer

Jamf Threat Labs has identified a novel macOS infostealer that exploits PyInstaller, a legitimate...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot

The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has...

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz...

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps

Microsoft has announced the upcoming release of a groundbreaking "Prevent Screen Capture" feature for...