Microsoft confirms it was hacked — what does this mean for you?

The Microsoft logo on a sign at the company's Redmond, Washington, headquarters.
(Image credit: VDB Photos/Shutterstock)

Microsoft was indeed hacked by the South American hacker crew Lapsus$, the software giant admitted in a blog post and lengthy analysis yesterday (March 22).

"Our investigation has found a single account had been compromised, granting limited access," Microsoft said. "No customer code or data was involved in the observed activities."

As for whether this intrusion, which resulted in the theft of an alleged 37 GB of source code pertaining to Bing, Bing Maps and Cortana, would compromise the security of Microsoft software or customers, the company firmly denied it. (On March 24, a new report said that Lapsus$ was led by a 16-year-old from England and a Brazilian teenager.)

Any risk to you? Nope, says Microsoft

"Microsoft does not rely on the secrecy of code as a security measure," the blog post said, "and viewing source code does not lead to elevation of risk."

Of course, that's what you would expect a hacked company to say. And there's certainly some skepticism online about Microsoft's insistence that this was no big deal.

We're inclined to give Microsoft the benefit of the doubt here, but you can bet that security experts will be going over the stolen code that Lapsus$ posted online to see if there's any way that it can be exploited. (The source code for Windows, Office and other desktop software does not appear to have been part of the stolen data.)

Until we learn more, we would urge you to keep all your Microsoft software updated and maintain other security "best practices" such as using one of the best password managers and one of the best antivirus programs. 

How did the hackers get in?

Microsoft didn't say exactly how Lapsus$, which Microsoft calls "DEV-0537," got into its systems. But it did provide a long and interesting analysis of Lapsus$'s methods and goals, which are unusual.

Unlike other criminal groups, Microsoft noted, Lapsus$ likes to make a lot of noise and acts as if media attention matters more than money. 

"DEV-0537 is known for using a pure extortion and destruction model without deploying ransomware payloads," the company said. The goal "is to gain elevated access through stolen credentials that enable data theft and destructive attacks against a targeted organization."

The crew has its own public Telegram channel where it announces hacks and refutes claims by hacked organizations, e.g. a point-by-point rebuttal yesterday of identity-management firm Okta's analysis of its own Lapsus$ hack. 

Last month, Lapsus$ attacked graphics-card maker Nvidia and demanded that the company provide driver software to permit easier mining of cryptocurrency.

Confidence tricks and payoffs

We have to confess a grudging admiration for Lapsus$, which seems to able to pull off very high-profile data breaches — Samsung has also been hacked — without using sophisticated malware or spy-movie techniques. Instead, Lapsus$ relies on old-fashioned bribery and trickery and an understanding of human nature.

"Their tactics include phone-based social engineering," such as convincing help-desk personnel to reset passwords, Microsoft wrote. 

Other Lapsus$ methods include "SIM-swapping to facilitate account takeover; accessing personal email accounts of employees at target organizations; paying employees, suppliers, or business partners of target organizations for access to credentials and multifactor authentication (MFA) approval; and intruding in the ongoing crisis-communication calls of their targets." 

Once Lapsus$ gets into a targeted organization, Microsoft added, it "creates global admin accounts in the organization's cloud instances, sets an Office 365 tenant level mail transport rule to send all mail in and out of the organization to the newly created account, and then removes all other global admin accounts, so only the actor has sole control of the cloud resources, effectively locking the organization out of all access."

That's already pretty epic. But Lapsus$ then takes it to the next level, infiltrating the hacked organization's own internal discussions about how to respond to Lapsus$'s intrusion.

It will join "the organization's crisis communication calls and internal discussion boards (Slack, Teams, conference calls, and others) to understand the incident response workflow and their corresponding response," Microsoft said. 

"This group understands the interconnected nature of identities and trust relationships in modern technology ecosystems and targets telecommunications, technology, IT services and support companies — to leverage their access from one organization to access the partner or supplier organizations."

Paul Wagenseil

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.

Read more
Windows
240 million Windows 10 users are vulnerable to six different hacker exploits — protect yourself now
How to disable the Windows key
Microsoft patches over 160 security flaws including 3 active zero days — update your PC right now
Malware
New macOS malware uses Apple's own code to quietly steal credentials and personal data — how to stay safe
An image of a CAPTCHA
Hackers are using reCAPTCHA to trick users into infecting their own PCs with malware — how to stay safe
A hacker typing quickly on a keyboard
Thousands of WordPress sites hijacked to spread Windows and Mac malware - how to stay safe
Reddit logo and Reddit logo on phone
Hackers have created hundreds of fake Reddit sites to spread info-stealing malware
Latest in Online Security
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
A man filing his taxes electronically on a laptop
AI-powered tax scams are here - how to stay safe from deepfakes, phishing and more this tax season
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Latest in News
A mosquito resting on a plant
Experts predict a spring surge in these 9 pest populations — here's what's forecast for your area
Apple Watch SE (2022) shown on wrist
Apple Watch SE 3 reportedly in ’serious jeopardy’ — here’s why
Galaxy S25 Plus held in the hand.
Samsung could delay One UI 7’s release in the US — here’s what we know
Claude AI on phone sitting on keyboard
Claude 3.7 Sonnet now supports real-time web searching — but there's a catch
Nintendo Switch 2
Nintendo Switch 2 pre-order date just tipped — here's when you might be able to buy
Apple iPhone 16 & 16 Plus hands-on.
iPhone 17 just tipped for this long overdue Pro feature in new report