Microsoft confirmed it has been tracking the Lapsus$ hacker group and released a set of recommendations for its customers on how to mitigate risks of being the next target. The company also confirmed that the group has gained “limited access” to some source codes of its products, but maintained that no customer code or data were involved in the cyber breach.
In a lengthy blog post published on Tuesday, Microsoft confirmed it has been actively monitoring the activities of the group, which it officially named DEV-0537. The tech giant noted that Lapsus$, per Microsoft’s observations in recent weeks, has employed social engineering and extortion campaigns against its targets.
Microsoft took note of the group’s claims of gaining access to its server, resulting in “exfiltrated portions of source code.” But the company assured its customers that their data and codes remain safe.
“No customer code or data was involved in the observed activities. Our investigation has found a single account had been compromised, granting limited access,” the company said. “Microsoft does not rely on the secrecy of code as a security measure and viewing source code does not lead to elevation of risk.”
Microsoft confirmed the incident a couple of days after Lapsus$ had reportedly leaked the source code for Microsoft’s software products, including Bing and Cortana. Bleeping Computer reported that the group shared a screenshot on their Telegram channel on Sunday to prove it had accessed Microsoft’s Azure DevOps server.
Lapsus$ released 9GB worth of files on late Monday, which they claimed to be containing the source code of more than 250 Microsoft projects. The same report, however, noted that uncompressed files included around 37GB of source code from the company.
Meanwhile, Microsoft warned its customers and other companies that Lapsus$ had been openly recruiting employees of potential targets who would give them credentials and multifactor authentication details in exchange for money.
The company noted that the hacker group has been using a common form of social engineering attack. They reportedly use a compromised account that they would then bombard with MFA prompts before calling the target company’s IT help desk to request for the credentials to be reset. Before Microsoft, Lapsus$ made headlines after reportedly targeting Nvidia, Samsung, and Ubisoft.
Photo by Aktar Hossain on Unsplash


Anthropic Eyes $350 Billion Valuation as AI Funding and Share Sale Accelerate
Jensen Huang Urges Taiwan Suppliers to Boost AI Chip Production Amid Surging Demand
Global PC Makers Eye Chinese Memory Chip Suppliers Amid Ongoing Supply Crunch
Nvidia Nears $20 Billion OpenAI Investment as AI Funding Race Intensifies
Baidu Approves $5 Billion Share Buyback and Plans First-Ever Dividend in 2026
Sam Altman Reaffirms OpenAI’s Long-Term Commitment to NVIDIA Amid Chip Report
Nvidia, ByteDance, and the U.S.-China AI Chip Standoff Over H200 Exports
Nintendo Shares Slide After Earnings Miss Raises Switch 2 Margin Concerns
Sony Q3 Profit Jumps on Gaming and Image Sensors, Full-Year Outlook Raised
SpaceX Reports $8 Billion Profit as IPO Plans and Starlink Growth Fuel Valuation Buzz
Nvidia Confirms Major OpenAI Investment Amid AI Funding Race
Nvidia CEO Jensen Huang Says AI Investment Boom Is Just Beginning as NVDA Shares Surge
Tencent Shares Slide After WeChat Restricts YuanBao AI Promotional Links
Elon Musk’s Empire: SpaceX, Tesla, and xAI Merger Talks Spark Investor Debate
TSMC Eyes 3nm Chip Production in Japan with $17 Billion Kumamoto Investment
SoftBank Shares Slide After Arm Earnings Miss Fuels Tech Stock Sell-Off
Google Cloud and Liberty Global Forge Strategic AI Partnership to Transform European Telecom Services 



