Wednesday, April 2, 2025
Homecyber securityMicrosoft's GitHub Account Hacked - 500 GB Of Microsoft's Private GitHub Repositories...

Microsoft’s GitHub Account Hacked – 500 GB Of Microsoft’s Private GitHub Repositories Data Stolen

Published on

SIEM as a Service

Follow Us on Google News

Recently, a hacker has claimed that he/she managed to steal more than 500GB of data from the tech giant Microsoft’s private GitHub repositories.

By observing the timestamps in the files that the hacker has published, indicates that the alleged hack could have occurred on March 28, 2020. 

On Wednesday evening, May 6, 2020, someone named as ‘Shiny Hunters’ have contacted, clearly announced that they had hacked a Microsoft’s Private GitHub repositories.

Moreover, the hacker, ‘Shiny Hunters’ that they have stolen more than 500 GB of private projects from the company’s private GitHub repositories with the intention of selling them, but somehow they changed their mind and decided to publish this data for free.

Microsoft’s Private Repositories Leaked

As a teaser, the hacker offers 1 GB of data on one of the hacker forums for registered users, but, somehow the members of the forum doubt the authenticity of the leak. As some leaked files contain Chinese texts, links to latelee.org, which is very unusual. Thus, the members on that hacker forum felt the data is not real.

Some catalog files and sample repositories provided by the hacker mainly contain code samples, test projects, eBooks, and other general data. Other repositories are more interesting, as they contain ‘wssd cloud agent,’ ‘The Rust/WinRT language projection,’ and ‘PowerSweep PowerShell.’ 

Ultimately, nothing serious has been leaked, and the tech giant Microsoft has nothing to worry about. According to security experts of the information security company, “Under the Breach,” this hack will not have any special consequences for the company, so there is not much to worry about.

But, the Cyber intelligence company, Under the Breach, has expressed their concern about the possible compromise of API keys and passwords left by the developers in projects, as happened before.

https://twitter.com/underthebreach/status/1258168260492701702

Apart from this, in a commentary of the security firm, ‘Under the Breach’ tweet that a Microsoft employee said the leak was most likely fake, as the company made it a rule to open all its repositories within 30 days.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Introduces End-to-End Encryption for Gmail Business Users

Google has unveiled end-to-end encryption (E2EE) capabilities for Gmail enterprise users, simplifying encrypted email...

New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time

A persistent Linux malware known as "Outlaw" has been identified leveraging unsophisticated yet effective...

Hackers Exploit JavaScript & CSS Tricks to Steal Browsing History

The web browsing history feature, designed to enhance user convenience by styling visited links...

Python Introduces New Standard Lock File Format for Enhanced Security

The Python Software Foundation (PSF) has officially announced the adoption of a new standardized...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time

A persistent Linux malware known as "Outlaw" has been identified leveraging unsophisticated yet effective...

Sliver Framework Customized Enhances Evasion and Bypasses EDR Detection

The Sliver Command & Control (C2) framework, an open-source tool written in Go, has...

Ransomware Threatens 93% of Industries— Resilience Is Critical

Ransomware continues to be one of the most disruptive cyber threats, with recent data...