Microsoft's Indian online store hacked, passwords and user data exposed

Leeky

Posts: 3,357   +116
Microsoft’s online retail store for India, operated by Indian company Quasar Media, remains offline today after hackers breached the website's defenses and stole user account information and passwords over the…

Read the whole story
 

Burty117

Posts: 4,062   +2,056
Well it kinda is, all those users should be changing their passwords anyway and the site is currently down.

All that data was un-encrypted, if Microsoft had been doing its job properly the data wouldn't have ended up on here in the first place.

All users would have had some kind of email sent to them to warn them, if the user doesn't do anything, more fool them?
 
G

Guest

Actually it is, because it shows that microsoft keeps unencrypted user passwords.
 
G

Guest

Microsoft’s online retail store for India, operated by Indian company Quasar Media ... how is this Microsoft's fault?
 

TekGun

Posts: 163   +29
The store is not run by Microsoft, the store is owned and operated by a Indian company that sells MS stuff.
 

ikesmasher

Posts: 3,099   +1,487
i mean, it just seems wierd that they would actually post the passwords without covering them, as many of those people might use that password for other services, too.
 

Leeky

Posts: 3,357   +116
I considered it safe given that the full email addresses and usernames were not disclosed. As they stand, the passwords are worthless without the other credentials required to log into various services online. The information released in that article image is actually less information than would normally be released by Anonymous when they upload data to Pastebin, for example.

Also, it is important that people are aware that it was an Indian company Quasar Media that owned and operated the site, not Microsoft themselves. I can't imagine Microsoft being aware of unencrypted customer information prior to this incident, and I very much doubt they'd have allowed it to continue had they found out.
 

3DCGMODELER

Posts: 307   +18
I think they forgot to tell them .....
...
" Oh, don't forget, to Encrypt the User data.!!"

Ya Think... Daaaa
 
G

Guest

number 119... has the WORST password, (you can see it in the picture)

email = first&lastname
pastword = first&lastname

dafaq?
 

Chazz

Posts: 679   +76
A lot of those email addresses can be figured out by looking at the other data. 119 and 130 shows that your attempt to censor blocks out just about 5 characters. So most of the email addresses can be figured out anyway using their first and last name from reference. I'd atleast censor their last name too.