Microsoft Security Oversight Leads to Website Hack
Microsoft's online store in India was compromised over the weekend by a group of Chinese hackers calling themselves the "Evil Shadow Team". The hackers were able to extract user IDs and passwords of the site.
While many are questioning how the hackers were able to breach Microsoft's security system, more troublesome is the realization that the company might not have taken the proper steps to secure the credentials of their customers prior to the attack.
Reportedly, Microsoft stored both login IDs and passwords for its users in plain text files, without any encryption system in place to protect this highly sensitive information.
"Unsafe Systems" Targeted by Hackers
Ironically, poor security protection seems to be the basis for the attack in the first place.
The Evil Shadow Team posted an explanatory message on the Microsoft website claiming that "unsafe systems will be baptized". (Source: maximumpc.com)
A secondary message also popped up in the wake of the discovery, this time on a website called Pastebin. There, the hackers made known its goal of bringing international attention to the security failures of some major corporations.
This is not the first time such an attack has occurred. Last year, hacker groups like Lulzsec carried out several high profile security penetrations that highlighted weaknesses in major online entities.
And not long ago Sony suffered multiple security breaches, with hackers collecting hundreds of stolen user IDs and passwords, wreaking havoc on gamers around the world. (Source: indiatimes.com)
Compromised Microsoft Site Taken Offline
At present, the Microsoft India website seems to be shut down by Microsoft. Patrons of the site are advised to change their passwords immediately once the site reappears and reopens for business.
Experts say that using the same login ID and password on another web service would be ill-advised, and users who feel compromised should change all suspect security codes at their earliest opportunities.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.