Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Threat Actor Claims Data Breach at Microsoft Exposing Records of 2,073 Employees

    Threat Actor Claims Data Breach at Microsoft Exposing Records of 2,073 Employees

    July 10, 2024

    A Threat Actor (TA) has claimed to have orchestrated a data breach from Microsoft which allegedly compromises sensitive data of over 2,000 employees. The notorious TA, operating under the pseudonym, 888, shared that the data was allegedly compromised in an undisclosed third-party breach in July 2024, but the data has the latest date of 2022.

    Details of Alleged Microsoft Data Breach

    According to the TA’s post on dark web marketplace BreachForums, the hacked data included information about 2,073 personally identifiable information (PII) records of Microsoft employees, including the first name, last name, job title, email, linkedin profile urls, city and country.

    To substantiate the data breach claim, the threat actor shared a sample of the data breach which included sensitive PIIs of users mostly from New Zealand and one user from Greece. The TA, however, did not elaborate on which third-party app of Microsoft was hacked to initiate the leak.

    Potential Impact on Microsoft Employees

    If proven, the potential consequences of this data breach could be critical as the sensitive PII records could be leaked. The organization should take appropriate measures to protect the privacy and security of the stakeholders involved. Leak of personal information can lead to identity theft, financial fraud, and a loss of trust among clients, potentially jeopardizing the company’s standing in the industry.

    Currently, details regarding the extent of the compromised Microsoft data and the motive behind the cyber assault remain undisclosed.

    Despite the claims made by the TA “888”, there is no public information of a leak from any of Microsoft’s assets which remain fully functional. This discrepancy has raised doubts about the authenticity of the bad actor’s assertion.

    he hacker, 888, has previously been linked to several high-profile data breaches, including those of Credit Suisse, Accenture India, Shell, Heineken, and UNICEF.

    To ascertain the veracity of the claims, The Cyber Express has reached out to Microsoft officials. As of the writing of this news report, no response has been received, leaving the data breach claim unverified.

    Microsoft Criticized for Poor Security Measures

    Microsoft has come under severe scrutiny over its security failures in the recent past.

    In April 2024, a significant data leak exposed sensitive employee credentials and internal company files to the internet, raising serious concerns about data security protocols within the organization. The data leak was identified through an open and public storage server hosted on Microsoft’s Azure cloud service.

    According to a report by TechCrunch, the data leak was not highlighted or detected by Microsoft’s internal security systems, raising questions about the efficacy of their monitoring mechanisms.

    The report further highlighted that the data accessible online included a myriad of sensitive information such as code, scripts, and configuration files containing passwords, keys, and credentials utilized by Microsoft employees for accessing internal databases and systems.

    In February, ‘Three high-risk vulnerabilities’ were reported in the Azure components of Microsoft’s cloud software solutions along with a critical IoT device vulnerability that potentially allowed for remote code execution(RCE) attacks.

    Last month, Microsoft pushed ahead with the new Windows Recall screen recording feature despite the concerns of security and privacy advocates that the company belatedly tried to address. After criticism, the company then announced that it will delay the Recall feature for further testing.

    Microsoft President Brad Smith, in a hearing by the House Committee on Homeland Security in June,  said to strengthen cybersecurity measures, the company has added 1,600 more security engineers this fiscal year and would add another 800 new security positions in the next fiscal year.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBuilding Gen AI with MongoDB & AI Partners | June 2024
    Next Article CISA Adds Critical Zero-Day Vulnerabilities from July 2024 Patch Tuesday to Exploited List

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4831 – TOTOLINK HTTP POST Request Handler Buffer Overflow Vulnerability

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4832 – TOTOLINK HTTP POST Request Handler Buffer Overflow Vulnerability

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Techniques to secure open source software

    Development

    How Modular Bricks are Revolutionizing the Efficiency of Large Language Models

    Development

    The death of spreadsheets: 6 reasons why AI will soon be the dominant business reporting tool

    News & Updates

    Case Study: Anderson Moss ®️

    Development

    Highlights

    CVE-2025-4189 – WordPress Audio Comments Plugin CSRF

    May 17, 2025

    CVE ID : CVE-2025-4189

    Published : May 17, 2025, 4:16 a.m. | 28 minutes ago

    Description : The Audio Comments Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.4. This is due to missing or incorrect nonce validation on the ‘audio-comments/audior-settings.php’ page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Severity: 6.1 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Dragon Age: The Veilguard director says, “you can play this game entirely offline,” and there won’t be any microtransactions or battle passes

    June 15, 2024

    Claude 3.5 Sonnet launch on Bedrock doesn’t open AWS to OpenAI, Google models

    June 24, 2024

    How to Build a Dynamic Wardrobe App with React Drag and Drop

    May 5, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.