Microsoft shares details of security breach that contained roughly 250 million entries

Microsoft logo
Microsoft logo (Image credit: Daniel Rubino / Windows Central)

What you need to know

  • Microsoft disclosed details regarding a security breach from last December.
  • The breach involved roughly 250 million entries from the support case analytics database.
  • Microsoft fixed the breach quickly on New Year's Eve.

Microsoft shared details surrounding a security breach from last December that involved roughly 250 million entries. The data came from an internal customer support database consisting of mostly anonymized user analytics. The data was exposed between December 5 and December 31. Microsoft discloses the details surrounding the breach in a blog post.

Bob Diachenko, a security researcher with Security Discovery, spotted the security breach and alerted Microsoft of the issue. Diachenko shared more details on Twitter. Diachenko pointed out that Microsoft jumped on the issue quickly and solved it within a day, even though it was New Year's Eve.

Diachenko spoke to ZDNet and specified that the database consisted of a cluster of five Elasticsearch servers. The five servers stored the same data.

Microsoft's investigation found no malicious use of the data, and Microsoft points out that the "vast majority of records were cleared of personal information in accordance with our standard practices." There were exceptions, however, in which case, people's personal data was exposed. Microsoft states that "if the information [was] in a non-standard format, such as an email address separated with spaces instead of written in a standard format (for example, "XYZ @contoso com" vs "XYZ@contoso.com)" then personal data may have remained unredacted. Microsoft already began notifying people whose data was not anonymized.

Microsoft will take a series of actions to reduce the chances of a similar breach happening in the future, as outlined in its blog post:

  • Auditing the established network security rules for internal resources.
  • Expanding the scope of the mechanisms that detect security rule misconfigurations.
  • Adding additional alerting to service teams when security rule misconfigurations are detected.
  • Implementing additional redaction automation.

Microsoft states that the security breach occurred due to misconfigured Azure security rules that were deployed on December 5, which have since been fixed.

CATEGORIES
Sean Endicott
News Writer and apps editor

Sean Endicott is a tech journalist at Windows Central, specializing in Windows, Microsoft software, AI, and PCs. He's covered major launches, from Windows 10 and 11 to the rise of AI tools like ChatGPT. Sean's journey began with the Lumia 740, leading to strong ties with app developers. Outside writing, he coaches American football, utilizing Microsoft services to manage his team. He studied broadcast journalism at Nottingham Trent University and is active on X @SeanEndicott_ and Threads @sean_endicott_.