Hackers claim to have obtained 30 million Microsoft user profiles
Hackers claim to have obtained 30 million Microsoft user profiles
Hackers claim to have obtained 30 million Microsoft user profiles, officials have denied.
Earlier, Microsoft publicly admitted that its services such as Microsoft 365 were once paralyzed by DDoS attacks.
Now, a hacker organization named Anonymous Sudan claims that the DDoS attack against Microsoft was carried out by it, and claims to have taken this opportunity to hack into Microsoft servers and obtained 30 million pieces of user information.
In order to prove that what they said is true, the organization has released 100 pieces of user data as evidence and sold the user data for $50,000.
At present, Microsoft has responded to this, denying that the server has been compromised.
Microsoft said that they found no evidence of illegal access to the server, and the authenticity of the 100 pieces of user data disclosed by the hacker is doubtful, and it is possible that the hacker registered by himself.
At present, neither side has made any further action on this.
What is DDoS attacks?
A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the regular functioning of a computer network, service, or website by overwhelming it with a flood of internet traffic.
In a DDoS attack, multiple compromised computers or devices, often referred to as a botnet, are used to send a massive amount of requests or data to a target system simultaneously.
This flood of traffic overwhelms the target’s resources, such as bandwidth, processing power, or memory, making it difficult for legitimate users to access the targeted network or service.
DDoS attacks are typically carried out using malware-infected computers or devices that are under the control of the attacker. These compromised devices, often referred to as “bots” or “zombies,” are usually part of a larger network of compromised machines, which can number in the thousands or even hundreds of thousands.
The attacker controls the botnet remotely and instructs the bots to send a barrage of traffic to the target, aiming to exhaust its resources and render it unable to function properly.
The motivations behind DDoS attacks can vary. Some attackers launch DDoS attacks for financial gain, demanding ransom or extorting organizations to stop the attack.
Others may carry out DDoS attacks as a form of protest or activism, targeting specific websites or services to disrupt their operations.
Additionally, DDoS attacks can be used as a diversionary tactic to divert attention from other malicious activities, such as data breaches or network intrusions.
To defend against DDoS attacks, organizations employ various strategies, including traffic filtering, rate limiting, and deploying specialized DDoS mitigation services.
These measures aim to identify and block malicious traffic, absorb or distribute the attack traffic, and ensure the availability and stability of the targeted network or service.
