Microsoft employees exposed internal passwords in security lapse
In March, Microsoft said that it continues to counter an ongoing cyber attack that allowed Russian state-backed hackers to steal portions of the company’s source code and internal emails from Microsoft corporate executives.
Security researchers Can Yoleri, Murat Özfidan and Egemen Koçhisarlı with SOCRadar, a cybersecurity company that helps organizations find security weaknesses, discovered an open and public storage server hosted on Microsoft’s Azure cloud service that was storing internal information relating to Microsoft’s Bing search engine.
The Azure storage server housed code, scripts and configuration files containing passwords, keys and credentials used by the Microsoft employees for accessing other internal databases and systems.
But the storage server itself was not protected with a password and could be accessed by anyone on the internet.
Yoleri told TechCrunch that the exposed data could potentially help malicious actors identify or access other places where Microsoft stores its internal files. Identifying those storage locations “could result in more significant data leaks and possibly compromise the services in use,” Yoleri said.
The researchers notified Microsoft of the security lapse on February 6, and Microsoft secured the spilling files on March 5.
It’s not known for how long the cloud server was exposed to the internet, or if anyone other than SOCRadar discovered the exposed data inside. When reached by email, a spokesperson for Microsoft did not provide comment by the time of publication. Microsoft did not say if it had reset or changed any of the exposed internal credentials.
This is the latest security gaffe at Microsoft as the company tries to rebuild trust with its customers after a series of cloud security incidents in recent years. In a similar security lapse last year, researchers found that Microsoft employees were exposing their own corporate network logins in code published to GitHub.
Microsoft also came under fire last year after the company admitted it did not know how China-backed hackers stole an internal email signing key that allowed the hackers broad access to Microsoft-hosted inboxes of senior U.S. government officials.
An independent board of cyber experts tasked with investigating the email breach wrote in their report, published last week, that the hackers succeeded because of a “cascade of security failures at Microsoft.”
In March, Microsoft said that it continues to counter an ongoing cyber attack that allowed Russian state-backed hackers to steal portions of the company’s source code and internal emails from Microsoft corporate executives.