Microsoft India store hacked, user data exposed
Microsoft contacts customers and suggests immediate action
IDG News Service - Microsoft is investigating a "limited compromise" of the company's online store in India, the company said Monday.
"The store customers have already been sent guidance on the issue and suggested immediate actions," the company said in a statement.
The user names and passwords of some customers may have been leaked, and users are being advised to change their passwords, said a person close to the situation, who declined to be named. Financial information of customers has not been exposed, the person said.
The store was defaced over the weekend by hackers who claimed to be Chinese. The hackers also released images of what appeared to be lists of users' names and passwords.
The Microsoft website is managed by a third-party service provider and was still down on Monday. Microsoft said on the site that it is working to restore access as quickly as possible.
The relatively unknown hacker group, called EvilShadow Team, wrote in Mandarin in a blog post that it had changed the main page of the store, and placed an image of China's flag on it because it wanted Microsoft to pay attention. "We are not famous, we know that there are other experts among us, people who are even better," the group said.
India has border disputes with both China and Pakistan, and the animosity gets reflected on social networks, and in hacks of websites on both sides of the borders. Some top Indian websites including that of the country's Central Bureau of Investigation have been hacked.
1,651 websites were defaced in India in November, according to data from the Indian Computer Emergency Response Team (CERT-In).
Michael Kan in Beijing contributed to this report.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts