Microsoft India store hacked, user data exposed
Microsoft contacts customers and suggests immediate action
IDG News Service - Microsoft is investigating a "limited compromise" of the company's online store in India, the company said Monday.
"The store customers have already been sent guidance on the issue and suggested immediate actions," the company said in a statement.
The user names and passwords of some customers may have been leaked, and users are being advised to change their passwords, said a person close to the situation, who declined to be named. Financial information of customers has not been exposed, the person said.
The store was defaced over the weekend by hackers who claimed to be Chinese. The hackers also released images of what appeared to be lists of users' names and passwords.
The Microsoft website is managed by a third-party service provider and was still down on Monday. Microsoft said on the site that it is working to restore access as quickly as possible.
The relatively unknown hacker group, called EvilShadow Team, wrote in Mandarin in a blog post that it had changed the main page of the store, and placed an image of China's flag on it because it wanted Microsoft to pay attention. "We are not famous, we know that there are other experts among us, people who are even better," the group said.
India has border disputes with both China and Pakistan, and the animosity gets reflected on social networks, and in hacks of websites on both sides of the borders. Some top Indian websites including that of the country's Central Bureau of Investigation have been hacked.
1,651 websites were defaced in India in November, according to data from the Indian Computer Emergency Response Team (CERT-In).
Michael Kan in Beijing contributed to this report.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!