Wednesday, December 18, 2024
Homecyber securityMicrosoft's GitHub Account Hacked - 500 GB Of Microsoft's Private GitHub Repositories...

Microsoft’s GitHub Account Hacked – 500 GB Of Microsoft’s Private GitHub Repositories Data Stolen

Published on

SIEM as a Service

Recently, a hacker has claimed that he/she managed to steal more than 500GB of data from the tech giant Microsoft’s private GitHub repositories.

By observing the timestamps in the files that the hacker has published, indicates that the alleged hack could have occurred on March 28, 2020. 

On Wednesday evening, May 6, 2020, someone named as ‘Shiny Hunters’ have contacted, clearly announced that they had hacked a Microsoft’s Private GitHub repositories.

- Advertisement - SIEM as a Service

Moreover, the hacker, ‘Shiny Hunters’ that they have stolen more than 500 GB of private projects from the company’s private GitHub repositories with the intention of selling them, but somehow they changed their mind and decided to publish this data for free.

Microsoft’s Private Repositories Leaked

As a teaser, the hacker offers 1 GB of data on one of the hacker forums for registered users, but, somehow the members of the forum doubt the authenticity of the leak. As some leaked files contain Chinese texts, links to latelee.org, which is very unusual. Thus, the members on that hacker forum felt the data is not real.

Some catalog files and sample repositories provided by the hacker mainly contain code samples, test projects, eBooks, and other general data. Other repositories are more interesting, as they contain ‘wssd cloud agent,’ ‘The Rust/WinRT language projection,’ and ‘PowerSweep PowerShell.’ 

Ultimately, nothing serious has been leaked, and the tech giant Microsoft has nothing to worry about. According to security experts of the information security company, “Under the Breach,” this hack will not have any special consequences for the company, so there is not much to worry about.

But, the Cyber intelligence company, Under the Breach, has expressed their concern about the possible compromise of API keys and passwords left by the developers in projects, as happened before.

https://twitter.com/underthebreach/status/1258168260492701702

Apart from this, in a commentary of the security firm, ‘Under the Breach’ tweet that a Microsoft employee said the leak was most likely fake, as the company made it a rule to open all its repositories within 30 days.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

CISA Releases Secure Practices for Microsoft 365 Cloud Services

The Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive (BOD) 25-01:...

CISA Warns of Adobe & Windows Kernel Driver Vulnerabilities Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding two...

Hackers Weaponizing Microsoft Teams to Gain Remote Access

Recent cybersecurity research has uncovered a concerning trend where hackers are exploiting Microsoft Teams...