Big Microsoft data breach – 250 million records exposed
Microsoft
has admitted it exposed nearly 250 million customer service records
owing to "misconfiguration of an internal customer support
database" used for tracking support cases that included logs of
conversations between Microsoft support agents and customers from all
over the world. All of the Microsoft customers' data was left
accessible to anyone with a Web browser, with no password or other
authentication needed, it was reported first by the Comparitech
a security research team led by Bob Diachenko.
"While
the investigation found no malicious use, and although most customers
did not have personally identifiable information exposed, we want to
be transparent about this incident with all customers and reassure
them that we are taking it very seriously and hold ourselves
accountable," Ann Johnson, Corporate Vice President,
Cybersecurity Solutions Group at Microsoft said in a statement late
Wednesday.
Microsoft's
the investigation determined that a change made to the database's network
security group on December 5, 2019, contained misconfigured security
rules that enabled exposure of the data.
According
to the company, its engineers remediated the configuration on
December 31, 2019, to restrict the database and prevent unauthorised
access.
"This
the issue was specific to an internal database used for a support case
analytics and does not represent an exposure of our commercial cloud
services" said the tech giant in a blog post.
The
records contained logs of conversations spanned 14 years from
2005 to December 2019.
"We
want to sincerely apologise and reassure our customers that we are
taking it seriously and working diligently to learn and take action
to prevent any future reoccurrence," said Microsoft.
The
the company thanked Diachenko for helping it fix the misconfiguration.
"I
immediately reported this to Microsoft and within 24 hours all
servers were secured," Diachenko said. "I applaud the MS
the support team for responsiveness and quick turnaround on this despite
New Year's Eve."
Diachenko
explained that most of the personally identifiable information
"emails, contact numbers, and payment information" was
redacted.
However,
many records contained plain text data, including but not limited to
customer email addresses, IP addresses, locations, Microsoft support
agent emails, case numbers, resolutions, and remarks and internal
notes marked as "confidential".
According
to the researchers, with detailed logs and case information in hand,
scammers stand a better chance of succeeding against their targets.
If
scammers obtained the data before it was secured, they could exploit
it by impersonating a real Microsoft employee and referring to a real
case number.
"Microsoft
customers and Windows users should be on the lookout for such scams
via phone and email. Remember that Microsoft never proactively
reaches out to users to solve their tech problems "users must
approach Microsoft for help first," said the Comparitech team.
This
is not Microsoft's first data security incident.
In
2013, hackers broke into the company's secret database for tracking
bugs in its software.
Between
January and March 2019, hackers compromised the account of a
Microsoft support agent. The company said there was a possibility
that the hacker accessed the contents of some Outlook users'
accounts.
Remember:
if ever you receive a security alert email, whether you think it is
legitimate or not, avoid clicking on any links, calling any numbers
or taking any online actions demanded in the email.
Find
your own way to the site where you would usually log in, and stay one
step ahead of phishing emails!
