Sunday, June 15, 2025
Homecyber securityMicrosoft's GitHub Account Hacked - 500 GB Of Microsoft's Private GitHub Repositories...

Microsoft’s GitHub Account Hacked – 500 GB Of Microsoft’s Private GitHub Repositories Data Stolen

Published on

SIEM as a Service

Follow Us on Google News

Recently, a hacker has claimed that he/she managed to steal more than 500GB of data from the tech giant Microsoft’s private GitHub repositories.

By observing the timestamps in the files that the hacker has published, indicates that the alleged hack could have occurred on March 28, 2020. 

On Wednesday evening, May 6, 2020, someone named as ‘Shiny Hunters’ have contacted, clearly announced that they had hacked a Microsoft’s Private GitHub repositories.

- Advertisement - Google News

Moreover, the hacker, ‘Shiny Hunters’ that they have stolen more than 500 GB of private projects from the company’s private GitHub repositories with the intention of selling them, but somehow they changed their mind and decided to publish this data for free.

Microsoft’s Private Repositories Leaked

As a teaser, the hacker offers 1 GB of data on one of the hacker forums for registered users, but, somehow the members of the forum doubt the authenticity of the leak. As some leaked files contain Chinese texts, links to latelee.org, which is very unusual. Thus, the members on that hacker forum felt the data is not real.

Some catalog files and sample repositories provided by the hacker mainly contain code samples, test projects, eBooks, and other general data. Other repositories are more interesting, as they contain ‘wssd cloud agent,’ ‘The Rust/WinRT language projection,’ and ‘PowerSweep PowerShell.’ 

Ultimately, nothing serious has been leaked, and the tech giant Microsoft has nothing to worry about. According to security experts of the information security company, “Under the Breach,” this hack will not have any special consequences for the company, so there is not much to worry about.

But, the Cyber intelligence company, Under the Breach, has expressed their concern about the possible compromise of API keys and passwords left by the developers in projects, as happened before.

https://twitter.com/underthebreach/status/1258168260492701702

Apart from this, in a commentary of the security firm, ‘Under the Breach’ tweet that a Microsoft employee said the leak was most likely fake, as the company made it a rule to open all its repositories within 30 days.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...