{"id":34858,"date":"2020-05-08T14:23:12","date_gmt":"2020-05-08T14:23:12","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31193\/Hacker-Gains-Access-To-Some-Private-Microsoft-GitHub-Repos.html"},"modified":"2020-05-08T14:23:12","modified_gmt":"2020-05-08T14:23:12","slug":"hacker-gains-access-to-some-private-microsoft-github-repos","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/","title":{"rendered":"Hacker Gains Access To Some Private Microsoft GitHub Repos"},"content":{"rendered":"<p>A hacker has gained access to a Microsoft employee&#8217;s GitHub account and has downloaded some of the company&#8217;s private GitHub repositories.<\/p>\n<p>The intrusion is believed to have taken place in March, and came to light this week when the hacker announced plans to publish some of the stolen projects on a hacking forum.<\/p>\n<p>While <em>ZDNet<\/em> has confirmed with multiple Microsoft employees that at least a small portion of the stolen files are authentic, we have been told that the hacker did not gain access to the source code of any major Microsoft core projects, such as Windows and Office.<\/p>\n<p>Microsoft employees who commented on the leak have told <em>ZDNet<\/em> that such major projects are hosted internally at Microsoft and not on the company&#8217;s public GitHub portal.<\/p>\n<p>The number of private repos believed to have been acquired by the hacker is believed to be around 1,200.<\/p>\n<p>A Microsoft spokesperson told <em>ZDNet<\/em> earlier today that the company is investigating the incident, but did not want to comment further.<\/p>\n<h3>Nothing of actual importance leaked<\/h3>\n<p>With the help of cyber-security firms <a href=\"https:\/\/www.nightlion.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Nightlion Security<\/a> and <a href=\"https:\/\/underthebreach.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Under the Breach<\/a>, <em>ZDNet<\/em> has obtained copies of files the hacker shared online this week.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>This includes a list of all the files and directories downloaded from Microsoft&#8217;s private GitHub repositories.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/08\/c3a48a9c-85ab-4e54-a640-70a9bb6f8111\/msft-leak-dirlist.png\" class alt=\"msft-leak-dirlist.png\"><\/span> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>We also received three projects, including full source code, of private Microsoft projects.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/hacker-gains-access-to-a-small-number-of-microsofts-private-github-repos\/\" class=\"lazy\" alt=\"msft-leak-asked.png\" data-original=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/05\/08\/258cbc21-f9ec-4940-ba41-d0d75e20ef53\/msft-leak-asked.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/05\/08\/258cbc21-f9ec-4940-ba41-d0d75e20ef53\/msft-leak-asked.png\" class alt=\"msft-leak-asked.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span> <span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/hacker-gains-access-to-a-small-number-of-microsofts-private-github-repos\/\" class=\"lazy\" alt=\"msft-leak.png\" data-original=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/08\/883ae498-50c2-4740-91c6-f1187cc02cd3\/msft-leak.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/08\/883ae498-50c2-4740-91c6-f1187cc02cd3\/msft-leak.png\" class alt=\"msft-leak.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>This reporter and <em>ZDNet<\/em>&#8216;s Microsoft writer <a href=\"https:\/\/www.zdnet.com\/meet-the-team\/us\/mary-jo-foley\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mary Jo Foley<\/a> have spoken yesterday and today with multiple Microsoft software engineers on the promise of anonymity. Sources have now confirmed that files and directories included on the list shared by the hacker did indeed contain projects that were stored in Microsoft&#8217;s GitHub account as private repositories.<\/p>\n<p>Other Microsoft employees made their assessment public, also confirming the leak&#8217;s authenticity.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/hacker-gains-access-to-a-small-number-of-microsofts-private-github-repos\/\" class=\"lazy\" alt=\"msft-hack-twitter.png\" data-original=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/05\/08\/02f24aa3-10c0-4687-9034-5afe3f576101\/msft-hack-twitter.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/05\/08\/02f24aa3-10c0-4687-9034-5afe3f576101\/msft-hack-twitter.png\" class alt=\"msft-hack-twitter.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>Microsoft engineers who initially told us yesterday that &#8220;the leak was a scam&#8221; have now walked back their comments as news of the leak spread inside the company, and some employees confirmed its partial authenticity.<\/p>\n<p>Employees who commented publicly on the leak as being a scam have also deleted their tweets.<\/p>\n<h3>A nothingburger?<\/h3>\n<p>We say &#8220;partial authenticity&#8221; because a large portion of the files and directories listed by the hacker do not appear to be Microsoft-related projects, or are open-source projects that have been public for years and have no affiliation to Microsoft. It is unclear how these GitHub repositories got on the hacker&#8217;s list.<\/p>\n<p>ZDNet was told that none of the authentic Microsoft projects obtained by the hacker are even remotely sensitive. Internal policy is that the Microsoft GitHub account is to be used to host and share open-source projects and documentation. The Microsoft GitHub account is also used to host private projects that are to be made available under an open-source license in the future.<\/p>\n<p>Furthermore, some employees said that their own private projects hosted on Microsoft&#8217;s official GitHub account were not included in the list of files obtained by the hacker, which means the threat actor only gained access to only a fraction of the non-sensitive information stored in Microsoft&#8217;s account.<\/p>\n<p>The only sensitive issue might be that some projects could contain access tokens and API credentials that may now have to be revoked.<\/p>\n<p>Under the Breach, which had direct contact with the hacker, has told ZDNet today that the attacker has now lost access to Microsoft&#8217;s private GitHub repositories, as Microsoft staff appears to have identified the compromised employee GitHub account.<\/p>\n<p>The hacker behind this incident is the same individual behind <a href=\"https:\/\/www.zdnet.com\/article\/hacker-leaks-15-million-records-from-tokopedia-indonesias-largest-online-store\/\" target=\"_blank\" rel=\"noopener noreferrer\">the Tokopedia hack<\/a> that ZDNet disclosed on Saturday.<\/p>\n<p><em>Additional reporting by Mary Jo Foley.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31193\/Hacker-Gains-Access-To-Some-Private-Microsoft-GitHub-Repos.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34859,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8634],"class_list":["post-34858","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermicrosoftdata-loss"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacker Gains Access To Some Private Microsoft GitHub Repos 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker Gains Access To Some Private Microsoft GitHub Repos 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-08T14:23:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/hacker-gains-access-to-some-private-microsoft-github-repos.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1133\" \/>\n\t<meta property=\"og:image:height\" content=\"357\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hacker Gains Access To Some Private Microsoft GitHub Repos\",\"datePublished\":\"2020-05-08T14:23:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/\"},\"wordCount\":619,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/hacker-gains-access-to-some-private-microsoft-github-repos.png\",\"keywords\":[\"headline,hacker,microsoft,data loss\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/\",\"name\":\"Hacker Gains Access To Some Private Microsoft GitHub Repos 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/hacker-gains-access-to-some-private-microsoft-github-repos.png\",\"datePublished\":\"2020-05-08T14:23:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/hacker-gains-access-to-some-private-microsoft-github-repos.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/hacker-gains-access-to-some-private-microsoft-github-repos.png\",\"width\":1133,\"height\":357},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-gains-access-to-some-private-microsoft-github-repos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,microsoft,data loss\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermicrosoftdata-loss\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hacker Gains Access To Some Private Microsoft GitHub Repos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacker Gains Access To Some Private Microsoft GitHub Repos 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/","og_locale":"en_US","og_type":"article","og_title":"Hacker Gains Access To Some Private Microsoft GitHub Repos 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-08T14:23:12+00:00","og_image":[{"width":1133,"height":357,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/hacker-gains-access-to-some-private-microsoft-github-repos.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hacker Gains Access To Some Private Microsoft GitHub Repos","datePublished":"2020-05-08T14:23:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/"},"wordCount":619,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/hacker-gains-access-to-some-private-microsoft-github-repos.png","keywords":["headline,hacker,microsoft,data loss"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/","url":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/","name":"Hacker Gains Access To Some Private Microsoft GitHub Repos 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/hacker-gains-access-to-some-private-microsoft-github-repos.png","datePublished":"2020-05-08T14:23:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/hacker-gains-access-to-some-private-microsoft-github-repos.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/hacker-gains-access-to-some-private-microsoft-github-repos.png","width":1133,"height":357},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hacker-gains-access-to-some-private-microsoft-github-repos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,microsoft,data loss","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermicrosoftdata-loss\/"},{"@type":"ListItem","position":3,"name":"Hacker Gains Access To Some Private Microsoft GitHub Repos"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34858"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34858\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34859"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}