Microsoft Denies Data Breach – Sudan Stolen Customer Accounts


Anonymous Sudan recently announced on Telegram the sale of a valuable Microsoft user data collection with a price tag of $50,000 for the full database.

The claims recently made by the hacking group “Anonymous Sudan” of breaching Microsoft’s servers and getting access to more than 30 million Microsoft accounts have been denied by Microsoft.

CSN

Announcement of Anonymous Sudan

The post showcases a sample of allegedly stolen Microsoft data, serving as breach-proof. But, with a mere 100 email and password combinations as evidence, Anonymous Sudan’s claims remain unverifiable and unconfirmed. 

While interested buyers were prompted to contact the group’s Telegram bot to discuss and arrange the data purchases.

Microsoft Denies Data Breach - Sudan Stolen Customer Accounts
Anonymous Sudan Announcement

In recent months, Anonymous Sudan has targeted Western entities with destructive DDoS attacks. Not only that even, the group recently acknowledged its association with Killnet, a pro-Russian hacktivist.

Microsoft recently acknowledged the role of Anonymous Sudan in service disruptions and outages affecting multiple services of it, including:-

Moreover, Microsoft confirmed with Cyber Security News that no signs of compromises were detected. They even reassured its clients that there was no reason to worry about this event.

Here’s what Microsoft stated:-

“At this time, our analysis of the data shows that this is not a legitimate claim and an aggregation of data. We have seen no evidence that our customer data has been accessed or compromised.”

Besides this, the status of Microsoft’s ongoing or concluded investigation remains unknown, and their response to potential data release remains uncertain.

Apart from this, it’s believed that it’s a pro-Kremlin initiative that is advancing a pro-Russian agenda, but the true identity of the group still remains unknown.

“AI-based email security measures Protect your business From Email Threats!” – Request a Free Demo.



Source link