Lapsus$ hacker group claims to be in possession of Microsoft's source code
Hackers hacked into Microsoft's Azure DevOps server and posted a screenshot of Microsoft's internal source code repos to Telegram.
In the image, we can see the source code of Cortana and other Bing projects with the names "Bing_STC-SV", "Bing_Test_Agile" and "Bing_UX". In addition, there are other repos in the image, but it is unknown what source code they contain.
It is quite strange that the hacker group left the initials of the logged in user as "IS" in the screenshot. This can help Microsoft identify the compromised account and take the necessary security measures.
Leaving out the initials of the account shows that Lapsus$ not only claims to have access to Microsoft's repo, but also wants to mock Microsoft. This is what this hacker group has done with other victims like NVIDIA, Samsung.
Currently, Microsoft has not confirmed whether their Azure DevOps account has been compromised. However, sharing with Bleeping Computer, Microsoft said that it is aware of Lapsus$'s statement and is conducting an investigation.
Microsoft further shared that the leak of their source code (if any) will not create great risks. The reason is because Microsoft has a different approach than the market standard. The new approach allows Microsoft to secure products without depending on source code secrecy.
However, all risks cannot be ruled out because in the leaked source code there are also private encryption keys, digital signatures, API codes or other proprietary tools.
You should read it
- Microsoft admits that hacker Lapsus$ stole the source code
- Paradise ransomware source code shared on hacker forum
- How to View Source Code
- The source code for iOS is revealed on GitHub as 'real goods', this is the time to reveal the biggest information in history
- Official news: Microsoft acquired GitHub for $ 7.5 billion
- Notorious hacker group Hafnium deployed malicious code to target Windows, Microsoft stood still
- 10 professional code sample websites for programmers
- Samsung released kernel source for Galaxy S20 smartphones
May be interested
- How to View Source Codethis wikihow teaches you how to view the source code of a website, which is the code behind any website (such as html, css, and javascript), on most common browsers. excluding a safari trick, you cannot view a website's source code while...
- If there is not enough ransom for the file, send an email to complain to the hacker, maybe you will get a surprise giftdue to the low income and inability to pay ransom, a victim sent an email to the hacker and received unexpected results.
- How to create a QR code for Telegram chat groupthe recipient of the telegram chat group qr code only needs to scan the qr code to access the telegram chat group. the following article will guide you to create a telegram chat group qr code.
- The source code for iOS is revealed on GitHub as 'real goods', this is the time to reveal the biggest information in historywith this source code, hackers, every security researcher can find the weakness of ios, the system that is supposed to be extremely secure. in the short term, this big hole will make jailbreak easier.
- iCloud has been hacked, Apple chooses ... silentapple's cloud service is no longer secure: a hacker group called doulci claims itself to be the first to hack iphone that is locked to icloud.
- 17 skills needed to become a hackerto become a professional hacker you need a lot of knowledge in both engineering and information technology. here are 17 skills you will need to have if you want to be a good hacker.
- Detect dangerous macOS virus developed by Chinese hacker groupresearchers have discovered a previously unknown macos virus. it is named gimmick and is the product of the storm cloud cyber-espionage hacker group from china.
- The hacker group threatened to spread the network attack tool behind WannaCrythe tool used by the hacker group to create the wannacry global cyber attack is about to be released.
- 10 professional code sample websites for programmersmost programmers have to do a lot of different tasks. knowing where to find free code samples online will help you learn and create applications.
- Appeared software can penetrate iCloud, Google Drivethe nso group claims its program can infiltrate and steal personal data from apple's cloud servers, google, facebook, and microsoft.