{"id":51230,"date":"2023-03-30T00:50:01","date_gmt":"2023-03-30T00:50:01","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34475\/BingBang-How-A-Simple-Developer-Mistake-Could-Have-Led-To-Bing.com-Takeover.html"},"modified":"2023-03-30T00:50:01","modified_gmt":"2023-03-30T00:50:01","slug":"bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/","title":{"rendered":"BingBang: How A Simple Developer Mistake Could Have Led To Bing.com Takeover"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.datocms-assets.com\/75231\/1680102717-bingbang_blog_cover_v3-1.gif\" class=\"ff-og-image-inserted\"><\/div>\n<p class>This blog provides a high-level overview of the vulnerability&nbsp;and its impact. For a technical deep dive, please refer to our <a class=\"font-semibold text-brand-500 no-underline hover:underline\" href=\"https:\/\/wiz.io\/blog\/azure-active-directory-bing-misconfiguration\">technical blog<\/a>.<\/p>\n<h2><span><\/span><strong>Introduction <\/strong>&nbsp;<\/h2>\n<p class>Wiz Research has identified a new attack vector in Azure Active Directory (AAD) that compromised Microsoft\u2019s Bing.com. The attack vector is based on a common AAD misconfiguration, exposing misconfigured apps to unauthorized access.&nbsp;<\/p>\n<p class>The researchers found several Microsoft applications vulnerable to this attack, one of which was a Content Management System (CMS) that powers Bing.com. This allowed them to take over Bing.com functionality, modify search results, and potentially enable the Office 365 credential theft of millions of Bing users. These credentials in turn granted access to users\u2019 private emails and documents.<\/p>\n<p class>Wiz Research named this attack \u201c#BingBang.\u201d The exploitation of the vulnerability was simple and didn&#8217;t require a single line of code.<\/p>\n<p class>All issues were responsibly disclosed to Microsoft upon discovery. Microsoft rapidly fixed its vulnerable applications and modified some AAD functionality to reduce customer exposure.&nbsp;<\/p>\n<p class>To check whether your environment has been affected, please refer to the \u201cCustomer Remediation Guidelines\u201d section of our <a class=\"font-semibold text-brand-500 no-underline hover:underline\" href=\"https:\/\/wiz.io\/blog\/azure-active-directory-bing-misconfiguration\">technical blog<\/a>.&nbsp;<\/p>\n<p class><em>BingBang attack flow<\/em><\/p>\n<h2><span><\/span><strong>Part 1: Logging in to a sensitive Bing.com interface<\/strong><\/h2>\n<p class>As part of Wiz Research efforts to investigate novel cloud risks and attack vectors (e.g. ChaosDB, OMIGOD, etc.), our researchers examined Azure Active Directory and discovered a risky configuration.&nbsp;<\/p>\n<h3><span><\/span>What is Azure Active Directory?&nbsp;<\/h3>\n<p class><a class=\"font-semibold text-brand-500 no-underline hover:underline\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/active-directory-whatis\">Azure Active Directory (AAD)<\/a> is a cloud-based identity and access management service. AAD is the most common authentication mechanism for apps created in Azure App Services or Azure Functions. You might be familiar with the AAD sign-in page:<\/p>\n<h3><span><\/span>What risky configuration did Wiz Research discover in AAD?&nbsp;<\/h3>\n<p class>AAD provides different types of account access: single-tenant, multi-tenant, personal accounts, or a combination of the latter two. A multi-tenant app allows logins from any user belonging to any Azure tenant. In a multi-tenant app, it is the developer\u2019s responsibility to check the user\u2019s original tenant and provision access accordingly. If they do not properly validate this information, any Azure user in the world could log in to the app.<\/p>\n<p class>This Shared Responsibility architecture is not always clear to developers, and as a result, validation and configuration mistakes are quite prevalent.&nbsp;&nbsp;<\/p>\n<h3><span><\/span>Discovering the vulnerable Bing application&nbsp;<\/h3>\n<p class>After recognizing these issues and their potential impact, the researchers started scanning for vulnerable applications (multi-tenant apps lacking proper validation) on the internet. The results were shocking \u2013 approximately 25% of the multi-tenant apps they scanned were vulnerable.&nbsp;&nbsp;<\/p>\n<p class>Most surprisingly, the list included an app made by Microsoft itself, named \u201cBing Trivia.\u201d&nbsp;<br \/>Because this app was misconfigured, the researchers were able to log in to it with their own Azure user. They then found a Content Management System (CMS) linked to Bing.com.<\/p>\n<h2><span><\/span><strong>Part 2: Modifying Bing.com search results<\/strong>&nbsp;<\/h2>\n<p class>To verify that this CMS was indeed controlling Bing\u2019s live results, they selected a keyword in the CMS and temporarily altered its content. They chose the \u201cbest soundtracks\u201d search query, which returned a list of highly recommended movie soundtracks.&nbsp;<\/p>\n<p class>They then proceeded to change the first result, \u201cDune (2021),\u201d to their personal favorite, \u201cHackers (1995),\u201d and pushed it to production. Their new result, complete with their title, thumbnail, and arbitrary link, immediately appeared on Bing.com:<\/p>\n<p class>This proved that they could control arbitrary search results on Bing.com. A malicious actor landing on the Bing Trivia app page could therefore have tampered with any search term and launched misinformation campaigns, as well as phished and impersonated other websites.&nbsp;<\/p>\n<h2><span><\/span><strong>Part 3: Stealing Office 365 credentials from Bing users<\/strong>&nbsp;<\/h2>\n<p class>After Wiz researchers realized they could modify Bing.com, they decided to test Cross-Site Scripting (XSS) viability.&nbsp;<\/p>\n<h3><span><\/span>What is a Cross-Site Scripting (XSS) attack?<\/h3>\n<p class>Cross-Site Scripting (XSS) attacks are a type of injection in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code to an end user through the website.&nbsp;<\/p>\n<p class>The researchers added a harmless XSS payload to Bing.com and saw that it ran as expected, so they quickly reverted their changes and immediately reported their findings to Microsoft.&nbsp;<\/p>\n<p class>While working with Microsoft on the report, the researchers started investigating the impact of the XSS they found, and discovered they could utilize it to compromise the Office 365 token of any Bing user.&nbsp;&nbsp;<\/p>\n<p class>Bing and Office 365 are integrated: Bing\u202fhas a \u201cWork\u201d section that allows users to search their Office 365 data. To implement this functionality, Bing communicates with Office 365 on the logged-in user&#8217;s behalf. Using this same feature, the researchers crafted an XSS payload that stole Office 365 access tokens from users:<\/p>\n<p class>With a stolen token, a potential attacker could access Bing users\u2019 Office 365 data,\u202fincluding Outlook emails, calendars, Teams messages, SharePoint documents, and OneDrive files. The tests were limited to the researcher\u2019s own user; no tests were performed on other Bing.com users.&nbsp;<\/p>\n<p class>A malicious actor with the same access could\u2019ve hijacked the most popular search results with the same payload and leaked the sensitive data of millions of users. According to SimilarWeb, Bing is the 27th most visited website in the world, with over a billion pageviews per month \u2013 in other words, millions of users could\u2019ve been exposed to malicious search results and Office 365 data theft.<\/p>\n<div class=\"-mx-2 md:-mx-4 lg:-mx-8 my-8 md:my-14\"><button class=\"w-full cursor-zoom-in\"><\/button><\/p>\n<p>BingBang attack flow<\/p>\n<\/div>\n<h2><span><\/span><strong>Takeaways \u2013 the challenges of securing cloud applications<\/strong>&nbsp;<\/h2>\n<p class>The cloud accelerates innovation via the flexibility of its infrastructure. This speed also brings changes and new risks. In this case, with only the click of a button, a user can accidentally expose a sensitive service to the internet.&nbsp;<\/p>\n<p class>In light of that risk, the Bing vulnerability we have discovered is a reminder that a simple developer mistake can have critical implications, potentially disrupting one of the world\u2019s most popular websites \u2013 one of the internet\u2019s key pillars.&nbsp;<\/p>\n<p class>As cloud builders, the agility with which we operate makes us prone to mistakes, which is why we should anticipate the next inevitable incident. Our resilience as security teams is dependent on how we catch and mitigate those mistakes. The prevention of accidental exposure should be a key pillar of any cloud security program:&nbsp;<\/p>\n<ol readability=\"2\">\n<li class=\"marker:h-3 marker:w-3 marker:text-xl marker:font-medium marker:text-brand\" readability=\"25\">\n<p class=\"my-0\">Rapid detection \u2013 how quickly can you detect and monitor a new public endpoint in your organization?&nbsp;<\/p>\n<\/li>\n<li class=\"marker:h-3 marker:w-3 marker:text-xl marker:font-medium marker:text-brand\" readability=\"26\">\n<p class=\"my-0\">Clear guardrails \u2013 how do you differentiate intended from accidental exposure? Guidelines should be clearly defined for approved exposure so that it can be properly configured and protected. Anything else should be considered accidental.&nbsp;<\/p>\n<\/li>\n<li class=\"marker:h-3 marker:w-3 marker:text-xl marker:font-medium marker:text-brand\" readability=\"25\">\n<p class=\"my-0\">Adaptive automation \u2013 Is the detection and validation of your attack surface automated to keep up with the pace of changes in the cloud?&nbsp;<\/p>\n<\/li>\n<\/ol>\n<p class>For specific mitigation steps for this type of exposure and further technical details you can refer to the <a class=\"font-semibold text-brand-500 no-underline hover:underline\" href=\"https:\/\/wiz.io\/blog\/azure-active-directory-bing-misconfiguration\">technical blog<\/a>.<\/p>\n<p class>We welcome your questions and feedback! Email us at research@wiz.io.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34475\/BingBang-How-A-Simple-Developer-Mistake-Could-Have-Led-To-Bing.com-Takeover.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51231,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[5505],"class_list":["post-51230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermicrosoftflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BingBang: How A Simple Developer Mistake Could Have Led To Bing.com Takeover 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BingBang: How A Simple Developer Mistake Could Have Led To Bing.com Takeover 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-30T00:50:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.datocms-assets.com\/75231\/1680102717-bingbang_blog_cover_v3-1.gif\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"BingBang: How A Simple Developer Mistake Could Have Led To Bing.com Takeover\",\"datePublished\":\"2023-03-30T00:50:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/\"},\"wordCount\":1168,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover.gif\",\"keywords\":[\"headline,hacker,microsoft,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/\",\"name\":\"BingBang: How A Simple Developer Mistake Could Have Led To Bing.com Takeover 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover.gif\",\"datePublished\":\"2023-03-30T00:50:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover.gif\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover.gif\",\"width\":1920,\"height\":1018},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,microsoft,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermicrosoftflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BingBang: How A Simple Developer Mistake Could Have Led To Bing.com Takeover\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BingBang: How A Simple Developer Mistake Could Have Led To Bing.com Takeover 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/","og_locale":"en_US","og_type":"article","og_title":"BingBang: How A Simple Developer Mistake Could Have Led To Bing.com Takeover 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-30T00:50:01+00:00","og_image":[{"url":"https:\/\/www.datocms-assets.com\/75231\/1680102717-bingbang_blog_cover_v3-1.gif","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"BingBang: How A Simple Developer Mistake Could Have Led To Bing.com Takeover","datePublished":"2023-03-30T00:50:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/"},"wordCount":1168,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover.gif","keywords":["headline,hacker,microsoft,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/","url":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/","name":"BingBang: How A Simple Developer Mistake Could Have Led To Bing.com Takeover 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover.gif","datePublished":"2023-03-30T00:50:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover.gif","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover.gif","width":1920,"height":1018},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/bingbang-how-a-simple-developer-mistake-could-have-led-to-bing-com-takeover\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,microsoft,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermicrosoftflaw\/"},{"@type":"ListItem","position":3,"name":"BingBang: How A Simple Developer Mistake Could Have Led To Bing.com Takeover"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51230"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51230\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51231"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}