Microsoft launched an investigation into the claims that its GitHub account has been hacked.
Recently some files allegedly stolen from the Microsoft Github account have been leaked online, and they appear to be legitimate.
The data leak was first reports on May 6 by experts at the data breach monitoring Under the Breach, a hacker claimed to have obtained 500 GB of source code from Microsoft’s private GitHub repositories.
The guy behind the hack is the same that recently leaked 15 million records stolen from Indonesian e-commerce giant Tokopedia.
Under the Breach analyzed the data and determined that the files were likely legitimate.
The dump includes source code for Azure, Office, and some Windows runtime files and APIs. Under the Breach, who verified the dump, said that it did not appear to include anything sensitive data, anyway it could hold keys and passwords left by mistake in the code.
According to the image shared by hacker, the data are dated March 28, 2020.
According to a post published on a hacker forum, the hacker is offering a 54 GB compressed archive (500 GB uncompressed).
Please vote Security Affairs for European Cybersecurity Blogger Awards – VOTE FOR YOUR WINNERS
https://docs.google.com/forms/d/e/1FAIpQLSe8AkYMfAAwJ4JZzYRm8GfsJCDON8q83C9_wu5u10sNAt_CcA/viewform
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – GitHub, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
Security Affairs Malware newsletter includes a collection of the best articles and research on malware…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles…
Chinese "kill switches" found in Chinese-made power inverters in US solar farm equipment that could…
FBI warns ex-officials are targeted with deepfake texts and AI voice messages impersonating senior U.S.…
Google warns that the cybercrime group Scattered Spider behind UK retailer attacks is now targeting…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium, DrayTek routers, and SAP NetWeaver…
This website uses cookies.