> series: anatomy_of_a_breach —— part: 133 —— target: microsoft —— records: 250,000,000 —— authentication: none —— span: 14_years<span class="cursor-blink">_</span>_
On 22 January 2020, security researcher Bob Diachenko reported that five Elasticsearch servers belonging to Microsoft were exposed to the internet without any authentication, containing approximately 250 million customer service and support records. The data spanned 14 years and included email addresses, IP addresses, geographic locations, descriptions of support cases, Microsoft support agent emails, case numbers, resolutions, and internal remarks — some marked as 'confidential.'
Microsoft confirmed the misconfiguration and secured the servers within 24 hours of notification. The company attributed the exposure to misconfigured network security group rules on the Elasticsearch instances. The incident was directly comparable to the Ecuador database exposure (2019) and the MongoDB ransomware wave (2017) — unauthenticated databases exposed to the internet — but with a crucial difference: this time, the organisation was Microsoft itself, demonstrating that misconfiguration is a universal risk regardless of technical expertise.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Microsoft exposure reinforced that cloud configuration verification must be continuous and automated — not a one-off exercise. Network security groups, access policies, and authentication settings can be changed at any time by any administrator, and a single misconfiguration can expose millions of records. Cyber Essentials mandates secure configuration. Our cloud configuration reviews identify exposed services. External vulnerability scanning detects publicly accessible databases. SOC in a Box monitors for configuration changes that create exposure. And UK Cyber Defence provides incident response when exposures are discovered.
Our <a href="/penetration-testing/cloud-configuration-review">cloud reviews</a> find exposed databases. <a href="/vulnerability-scanning">External scanning</a> detects public services. <a href="/cyber-essentials">Cyber Essentials</a> mandates secure configuration.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call