Microsoft hid the hacking of data in 2013
Not only is Yahoo the Fortune 500 company hiding the data leak.
Four and a half years ago, Microsoft was in a similar situation when a "very complicated hacker group" had hacked data to track their patches and reported bugs, though it had never been published until today. now on.
This Windows database contains information about critical vulnerabilities that have not been patched on some of the software used by many people, including Microsoft's Windows operating system.
5 former Microsoft employees told Reuters that MIcrosoft had silently handled the case, fixed errors and vulnerabilities in the database that were hacked to prevent hackers from taking advantage.
The person behind the hack
The data hacking was done by a famous hacker group specializing in hacking tech companies in Silicon Valley, having high skills and many names like Morpho, Jripbot, ZeroWing, Sphinx Moth, Butterfly and Wild Neutron. They are also the team that exploited the zero-day JAVA vulnerability to hack Macs that Microsoft employees use.
How to deal with Microsoft
The hack was discovered in February 2013. A few weeks later, Microsoft admitted to leaking data but said the attacker was restricted to network access.
Before the general situation, each company has different ways of handling
'As Facebook and Apple have said, Microsoft confirmed we had a security problem,' Microsoft said in a statement. 'Some computers, including some Macs, are infected with malicious code like some other companies. There is no evidence of customer data being affected and we are still investigating. '
Mozilla has a better way to solve the problem
Microsoft is not the only company leaking information about vulnerabilities and reporting errors. Mozilla also fell into a similar situation in 2015 but they decided to say the whole thing.
Kaspersky also acknowledged being attacked by Duqu 2.0 APT. Bitdefender also suffered data leaks in 2015.
You should read it
- The man lived only by hacking online games for 20 years
- The most mysterious hacks in history
- Microsoft's 6 Biggest Hacks
- The 10 biggest crypto hacks and scams of 2023
- DNS attacks are costing governments worldwide huge amounts
- How iPhone vulnerabilities allow websites to hack iOS devices
- Steps to export Microsoft Access data to Word documents
- Even mobile sensors can become phishing attacks
May be interested
- Learn about Ethical hacking using Kali Linux and Raspberry Pia raspberry pi 3 runs kali linux for building amazing hacking skills. this small computer is cheap, powerful and very flexible.
- Growth Hacking growth strategy - Part 1along with the development of connectivity technology, there are many ways to help you reach customers, promote your business more easily if you update trends in a timely manner. growth hacking is one of those new business strategies.
- Instagram account of a series of famous stars hacked and used as a means of fraudthe popular instagram account of the raid campaign after a period of cooling down has continued to heat up over the past few days.
- Learn 8 online hacker training programs for only 39 USDbecause personal data, widely publicized security vulnerabilities are becoming increasingly popular, moral hackers, or white-hat hackers, are being hunted by businesses to help them maintain. maintaining network and data security.
- Basic hacking techniques - Attendance - Part IIIassuming that the implementation of steps i and ii failed or the information obtained could not be sufficient to launch an instant attack, the hacker would switch to a method of identifying valid user accounts or unprotected shared resources enumeration is a way to extract valid accounts or resources from the system. in part iii, i will detail the most common methods, and the basic tools of attendance technology - step one
- Warning: Your DNA data can be hacked and misusedscientists warn that without improved security measures, hackers could target the technology, leading to risks such as personal data theft and biological threats.
- The 13-year-old 'Hacker' enters the school's computer system to create a 'list of the most hated kids'recently, a 13-year-old 'young man' in the united states was investigated for allegedly illegally accessing and using personal data of a teacher, thereby breaking into the school's computer system to steal personal information of other students and create a blacklist of the most hated students in the school.
- IoT smart watches can put children in dangerthe internet of things (iot) has been, will and will bring a complete change to human life, but it will also bring us a lot of troubles.
- Manage and delete browsing data on Microsoft Edgemicrosoft's edge browser for windows stores a significant amount of data on the device's hard drive, from the records of previously visited web pages, to frequently used passwords. to access email, bank website, etc.
- Enigma is hacked, more than $ 470,000 Ethereum is stolenan unidentified hacker has stolen ethereum worth more than $ 471,000 - one of the most popular virtual currency and increasing value - in a hack where big virtual money is invested, enigma.