The Cyber Press Research Team uncovered a data leak file that exposed the personal and professional information of 2,073 Microsoft employees obtained from Microsoft’s third-party vendor data breach. A threat actor named @888, which is actively leaking data in underground forums, leaked the Microsoft employees’ data today and claimed it was a third-party breach.
“In July 2024, 2,073 Microsoft employees’ information were exposed after a third party data breach.” a forum user who breached the 3rd-party vendor and leaked the data quoted.
The Cyber Press Research Team has validated the authenticity of the leaked data. Our researchers have confirmed that the exposed information is accurate and pertains to current Microsoft employees. This breach highlights the vulnerability of third-party vendors and the potential risks they pose to major corporations.
Details of the Compromised Data
The breach has resulted in the exposure of critical employee information, which includes:
- First Name
- Last Name
- Job Title
- Email Verification Status
- Direct Phone Number
- Corporate Phone Number
- Number of Employees
- Team
- LinkedIn URL of the Person
- Company Website
- City of the Person
- State of the Person
- Country of the Person
- Company Phone Number
- Email Verification Updated At
The substantial portion of the leaked data consists of high-ranking positions at Microsoft, including Chief Marketing Officer, Chief Technology Officer, Chief Security Officer, Chief Operating Officer, Directors, Vice Presidents, and other managerial roles from various teams such as Finance, Development, Data Center, Business Development, Azure Cloud, Sales, Project Management, and more.
Due to its public availability, we can observe that forum users have already accessed the files several times.
Potential Consequences
The exposure of such high-level employees’ information can have several severe implications:
1. Targeted Phishing Attacks
With the compromised data, cybercriminals can craft highly personalized and convincing phishing attacks aimed at these executives. Given their roles, successful phishing attempts could lead to unauthorized access to confidential company information and strategic plans.
2. Business Email Compromise (BEC)
Hackers might exploit the direct phone numbers and email addresses to execute BEC scams, posing as these high-level executives to trick other employees or external partners into transferring funds or divulging sensitive information.
3. Reputational Damage
The breach of data of such prominent figures within the company could harm Microsoft’s reputation, affecting investor confidence and customer trust. It highlights potential weaknesses in Microsoft’s data security practices, especially concerning third-party vendors.
Mitigation Strategies:
- Notification and Support: Inform affected employees and provide identity theft protection.
- Enhanced Email Security: Improve protocols and employee education on phishing.
- Vendor Security Review: Ensure third-party vendors adhere to strict security standards.
- Reputation Management: Transparent communication with stakeholders.
- Advanced Security Measures: Implement multi-factor authentication and regular security audits.