• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft confirms server misconfiguration led to 65,000+ companies' data leak

Microsoft Confirms Server Misconfiguration Led to 65,000+ Companies’ Data Leak

You are here: Home / General Cyber Security News / Microsoft Confirms Server Misconfiguration Led to 65,000+ Companies’ Data Leak
October 21, 2022

Microsoft this 7 days verified that it inadvertently exposed information and facts linked to countless numbers of shoppers following a security lapse that remaining an endpoint publicly obtainable around the internet sans any authentication.

“This misconfiguration resulted in the prospective for unauthenticated obtain to some business transaction details corresponding to interactions between Microsoft and possible customers, these kinds of as the planning or opportunity implementation and provisioning of Microsoft companies,” Microsoft said in an notify.

The misconfiguration of the Azure Blob Storage was noticed on September 24, 2022, by cybersecurity enterprise SOCRadar, which termed the leak BlueBleed. Microsoft said it is in the approach of specifically notifying impacted clients.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

The Windows makers did not disclose the scale of the facts leak, but in accordance to SOCRadar, it has an effect on additional than 65,000 entities in 111 countries. The publicity quantities to 2.4 terabytes of knowledge that is composed of invoices, solution orders, signed buyer paperwork, lover ecosystem facts, amid many others.

“The exposed data include things like information dated from 2017 to August 2022,” SOCRadar reported.

Microsoft, having said that, has disputed the extent of the issue, stating the facts integrated names, email addresses, email content, corporation name, and phone figures, and hooked up documents relating to company “concerning a purchaser and Microsoft or an approved Microsoft companion.”

It also claimed in its disclosure that the threat intel firm “considerably exaggerated” the scope of the problem as the knowledge established is made up of “copy details, with various references to the same email messages, jobs, and buyers.”

Microsoft

On leading of that, Redmond expressed its disappointment over SOCRadar’s decision to launch a general public look for software that it claimed exposes buyers to avoidable security challenges.

SOCRadar, in a follow-up publish on Thursday, likened the BlueBleed lookup engine to info breach notification service “Have I Been Pwned,” enabling businesses to lookup if their knowledge was uncovered in a cloud data leak.

The cybersecurity vendor also explained it has briefly suspended any BlueBleed queries as of Oct 19, 2022, following Microsoft’s request.

CyberSecurity

“Microsoft getting unable (study: refusing) to inform clients what data was taken and seemingly not notifying regulators – a legal necessity – has the hallmarks of a main botched response,” security researcher Kevin Beaumont tweeted. “I hope it is not.”

Beaumont additional mentioned the Microsoft bucket “has been publicly indexed for months” by providers like Grayhat Warfare and that “it truly is even in research engines.”

There is no evidence that the info was improperly accessed by danger actors prior to the disclosure, but these types of leaks could be exploited for malicious uses this kind of as extortion, social engineering attacks, or a brief revenue.

“Although some of the details that may perhaps have been accessed appears to be trivial, if SOCRadar is correct in what was exposed, it could consist of some sensitive information about the infrastructure and network configuration of probable consumers,” Erich Kron, security recognition advocate at KnowBe4, told The Hacker Information in an email.

“This information could be precious to potential attackers who may be looking for vulnerabilities within just 1 of these organizations’ networks.”

Found this posting exciting? Observe THN on Fb, Twitter  and LinkedIn to read through extra unique content we publish.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Cyber-Enabled Crimes Are Biggest Police Concerns
Next Post: A Quick Look at the “Strengthening America’s Cybersecurity” Initiative a quick look at the "strengthening america's cybersecurity" initiative»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.