Friday, November 15, 2024
Homecyber securityMicrosoft's GitHub Account Hacked - 500 GB Of Microsoft's Private GitHub Repositories...

Microsoft’s GitHub Account Hacked – 500 GB Of Microsoft’s Private GitHub Repositories Data Stolen

Published on

Recently, a hacker has claimed that he/she managed to steal more than 500GB of data from the tech giant Microsoft’s private GitHub repositories.

By observing the timestamps in the files that the hacker has published, indicates that the alleged hack could have occurred on March 28, 2020. 

On Wednesday evening, May 6, 2020, someone named as ‘Shiny Hunters’ have contacted, clearly announced that they had hacked a Microsoft’s Private GitHub repositories.

- Advertisement - SIEM as a Service

Moreover, the hacker, ‘Shiny Hunters’ that they have stolen more than 500 GB of private projects from the company’s private GitHub repositories with the intention of selling them, but somehow they changed their mind and decided to publish this data for free.

Microsoft’s Private Repositories Leaked

As a teaser, the hacker offers 1 GB of data on one of the hacker forums for registered users, but, somehow the members of the forum doubt the authenticity of the leak. As some leaked files contain Chinese texts, links to latelee.org, which is very unusual. Thus, the members on that hacker forum felt the data is not real.

Some catalog files and sample repositories provided by the hacker mainly contain code samples, test projects, eBooks, and other general data. Other repositories are more interesting, as they contain ‘wssd cloud agent,’ ‘The Rust/WinRT language projection,’ and ‘PowerSweep PowerShell.’ 

Ultimately, nothing serious has been leaked, and the tech giant Microsoft has nothing to worry about. According to security experts of the information security company, “Under the Breach,” this hack will not have any special consequences for the company, so there is not much to worry about.

But, the Cyber intelligence company, Under the Breach, has expressed their concern about the possible compromise of API keys and passwords left by the developers in projects, as happened before.

https://twitter.com/underthebreach/status/1258168260492701702

Apart from this, in a commentary of the security firm, ‘Under the Breach’ tweet that a Microsoft employee said the leak was most likely fake, as the company made it a rule to open all its repositories within 30 days.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Understanding Crypto Macroeconomic Factors: Navigating Inflation, Rates, And Regulations 

Diving into the world of cryptocurrencies, I've found it's a fascinating intersection of technology...

Crypto Network Security: Essential Tips To Protect Your Digital Assets In 2023 

Exploring the world of cryptocurrencies has been a thrilling journey for me. The allure...