Home A bug in Microsoft’s login system left your Office account wide open to complete takeover

A bug in Microsoft’s login system left your Office account wide open to complete takeover

A massive bug in a Microsoft subdomain could have left your Microsoft account — from your Office documents to your Outlook emails — susceptible to hacking. An India-based security researcher and bug hunter, Sahad Nk, recently uncovered the vulnerabilities. It was a series of bugs which when chained together could allow access to someone’s Microsoft account.
 

A Microsoft bug could have exposed 400 million accounts

While working as a security researcher, Nk discovered that the Microsoft subdomain, success.office.com, wasn’t properly configured. He was, in fact, able to completely take over the subdomain. He used a CNAME record, a canonical record used to link one domain to another, to point the unconfigured subdomain to his own Azure instance. By doing this, Nk could control the subdomain, and any data sent to it.
 

 
That wouldn’t have been much of a problem on its own if there wasn’t this second major vulnerability.
Microsoft Office, Outlook, Store, and Sway apps send authenticated login tokens to the success.office.com subdomain. But Nk also found that these apps use a wildcard regex, allowing all office.com — including his newly controlled subdomain — to be trusted. This way, he could gain access to any Microsoft account simply by making the user click on a specially crafted link sent in an email. And because Nk has access on Microsoft’s side, that link would come in the form of a login.live.com URL. Not even the savviest of internet users and phishing detectors could suspect the URL.
If it were controlled by a malicious attacker, as many 400 million Office 365 users could have been exposed. Thankfully, Nk quickly reported the bug to Microsoft, which then fixed it.
Reportedly, the issues were previously discovered in June itself. They were eventually fixed in November before being remediated by Sahad Nk. He was able to do so by removing the CNAME record, a Microsoft spokesperson told to TechCrunch.
Microsoft paid out a bug bounty for Nk’s efforts.

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the gambling and blockchain industries for major developments, new product and brand launches, game releases and other newsworthy events. Editors assign relevant stories to in-house staff writers with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest iGaming headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Gambling News

    Explore the latest in online gambling with our curated updates. We cut through the noise to deliver concise, relevant insights, keeping you informed about the ever-changing world of iGaming and its most important trends.

    In-Depth Strategy Guides

    Elevate your game with tailored strategies for sports betting, table games, slots, and poker. Learn how to maximize bonuses, refine your tactics, and boost your chances to beat the house.

    Unbiased Expert Reviews

    Honest and transparent reviews of sportsbooks, casinos and poker rooms crafted through industry expertise and in-depth analysis. Delve into intricacies, get the best bonus deals, and stay ahead with our trustworthy guides.