A security lapse exposes internal passwords at Microsoft, compromising employee data

The discovery of a security lapse at Microsoft, resulting in the exposure of internal company files and credentials, underscores the ongoing challenges faced by organizations in securing their data in the cloud. The exposed Azure storage server contained sensitive information related to Microsoft’s Bing search engine, including passwords, keys, and credentials used by employees to access internal databases and systems.

While the exposed data was not protected with a password and could be accessed by anyone on the internet, Microsoft was notified of the security issue by cybersecurity researchers from SOCRadar. After being informed on February 6, Microsoft took action to secure the exposed files by March 5.

According to SOCRadar, the exposed data could potentially aid malicious actors in identifying and accessing other internal storage locations within Microsoft’s infrastructure, leading to further data leaks and potential compromises of services.

Microsoft Employees Expose Internal Passwords - Spiceworks

In response to inquiries about the incident, Microsoft’s Jeff Jones stated that the credentials exposed in the security lapse were temporary and accessible only from internal networks, and were disabled after testing. However, the spokesperson did not disclose the duration of the exposure or whether any unauthorized parties accessed the exposed data.

This incident adds to a series of security lapses that Microsoft has experienced in recent years, highlighting the importance of robust cybersecurity measures and continuous monitoring to safeguard sensitive information stored in the cloud. As organizations increasingly rely on cloud services, maintaining strong security practices is essential to prevent unauthorized access and protect against data breaches.