“Our cybersecurity response teams are quickly engaged to remediate the compromised account and prevent further activity,” Microsoft said in the post.
Addressing claims by Lapsus $ that the group had Stolen Microsoft source code, the technology Giant said Tuesday that Microsoft’s approach to risk management means the possession of the code would not benefit the hackers even if they had managed to access it.
“Microsoft doesn’t rely on the secrecy of code as a security measure and viewing source code doesn’t lead to elevation of risk,” Microsoft said.
Microsoft added that the techniques Child $ used in the attack on company systems were consistent with those Microsoft has observed the group using against other targets.
In the past, Microsoft said, Child $ has sought to Steal individual user Credentials to gain access to an organization or corporate network. Then, the group would comb through office Collaboration tools such as SharePoint, Teams and Slack to discover other users on the network whose accounts could be targeted to deepen the compromise.
Child $ has even been known to listen in on victims’ conference calls to discuss the breach response, according to Microsoft.
Microsoft described Lapsus $ as having an sophisticated grasp of technology supply chains, understanding how to use one organization’s relationships or reliance on another to its advantage. In addition to tech, Telecom and IT support firms, Child $ has “also been observed targeting government entities, manufacturing, higher education, energy, retailers, and healthcare,” Microsoft said.