Microsoft breach causes the data of 65,000 international companies to leak

Microsoft breach causes the data of 65,000 international companies to leak

According to the security research firm Socraradar, a compromise on Microsoft’s servers led to the exposure of data from more than 65,000 firms in 111 countries. According to Socraradar, it has contacted Microsoft of its findings, which demonstrate in great detail that the Azzure Blob Storage server that was created in the form may have been compromised, perhaps detecting 2.

4 terabytes of sensitive material, including identities, contact information (phone numbers, email addresses, corporate names), and files with private firm information (such as idea proof documents, sales statistics, and sales data, product requests, among other things) that were attached.

After being informed of rags on September 24, 2022, Microsoft issued a statement this week in which it said that it had secured the hacked end point, which “can only be accessed only through the required approval”, and that the investigation “did not find a sign that customer accounts or systems were subjected to hacking “. The business added that it had been in touch with the rag-affected clients.

According to the Arab Technical News Page, Socrarad also responded by giving Microsoft customers who could be concerned about being impacted by data leaking access to the Bluebleed search portal.

According to the website Bleeping Computer, the security firm noted that its research was able to link 65,000 entities that were revealed with files that were formed between 2017 and 2022, even with the speed of Microsoft’s response to taking measures to repair the server that was improperly configured.

Microsoft, on the other hand, expressed dissatisfaction with Socraradar’s response to the hack, claiming that promoting the use of its search engine “does not serve to ensure the customer’s privacy or safety and may expose them to extra dangers.”

65,000 foreign companies’ data is exposed as a result of a Microsoft security compromise.

About Author

Technology