Microsoft Admits to 3-Month Consumer E-Mail Breach

Microsoft on Friday sent letters to some of its e-mail users that their accounts may have been accessed by "individuals outside Microsoft" over the past three months.

The letter, reproduced on a Reddit forum, noted that the breaches happened between Jan. 1 and March 28 of this year because "a Microsoft support agent's credentials were compromised." The outside parties were able to view things like the e-mail addresses of the user and those they communicated with, as well as folder names and subject-line content.

Microsoft had suggested in its letter that the attackers could not read the contents of peoples' e-mails. However, it later backtracked on that statement. So far, there appears to be no general information about the breach published by Microsoft, apart from the letter it sent to affected users.

Login credentials weren't exposed, according to Microsoft's letter. It nevertheless recommended that affected e-mail users should "reset your passwords" and be wary of getting e-mails with misleading domain names.

Microsoft told TechCrunch that "a limited consumer accounts were impacted, and we have notified all impacted customers." According to that Saturday-posted TechCrunch story, no business customers were affected.

A Motherboard story, citing an unnamed source, indicated that Hotmail, MSN and Outlook accounts were affected and the attackers could access e-mail content. In response, Microsoft confirmed to Motherboard that the attackers had gained access to the e-mail contents of some users, but that just six percent of the total was so affected. Motherboard's source also indicated that the attackers had access for six months, in contrast to the three months claimed by Microsoft.

Microsoft isn't disclosing how many accounts were affected by the breach, but it disabled the compromised credentials to block attacker access, according to a story by The Verge.

Targeting a privileged account, such as an accounted held by a Microsoft support agent, is a common tactic of attackers, according to Ilia Kolochenko, founder and CEO of Geneva-based Web security company ImmuniWeb (formerly High-Tech Bridge).

"Compromise of privileged accounts is a widespread and effective method among cybercriminals to get to the crown jewels at high speed and low cost," Kolochenko indicated in an e-mailed statement. "It is, however, quite surprising that such a reputable company as Microsoft reportedly has not reacted to the anomalies for as long as three months."

The typical defense is for organizations to monitor their privileged accounts. It's a fairly easy task to do given current machine learning technologies, Kolochenko added.

In the meantime, Kolochenko recommended that all Outlook users should change their passwords, including the passwords on other accounts that were used for Outlook account recovery purposes.

"As a precaution, all Outlook users should change their passwords and secret questions, as well as passwords for any other accounts that sent, or could have sent, a password recovery link to their Outlook email."

According to Motherboard's source, a possible motivation of the attackers was to gain access to account recovery information in order to unlock stolen iPhones.

About the Author

Kurt Mackie is senior news producer for the 1105 Enterprise Computing Group.


  • A Quicker Way To Create Hyper-V Inventory Reports

    If you need to generate Hyper-V inventory reports but don't want the hassle of writing your own custom PowerShell script, here is a shortcut.

  • Patch Management for Hyper-V Replica Hosts

    Here's how you can use Hyper-V's replica infrastructure to minimize disruptions caused by the patch management process.

  • What Happens If You Can't Get a Perpetual Microsoft Office License?

    It's getting harder to buy standalone Office licenses from Microsoft. Will a purely subscription-based Office model be worth it for users, or are there better alternatives in the market?

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.