Social media and email accounts of some Microsoft employees were hit by phishing attacks, the company said Documents linked with law enforcement inquiries appear to have been stolen in recent phishing attacks on certain employee email accounts, Microsoft said.The technology giant said earlier this month that a small number of Microsoft employee social media and email accounts had been impacted in a phishing attack. The accounts were reset and no customer information was compromised, Microsoft said.On Friday, Adrienne Hall, general manager in Microsoft’s Trustworthy Computing Group, said in a blog post that it appeared that documents associated with law enforcement inquiries were stolen. “If we find that customer information related to those requests has been compromised, we will take appropriate action,” Hall said.The company will, however, not comment on the validity of any stolen emails or documents in deference to “the privacy of our employees and customers — as well as the sensitivity of law enforcement inquiries,” she added. Microsoft said its investigation continues, and that the type of attack was not uncommon, as many companies face phishing attempts from cybercriminals.The company has been recently targeted by the Syrian Electronic Army, a hacker group that supports the Syrian regime of Bashar al-Assad. SEA attacked this month the social media properties of Skype and other Microsoft social media and blogs, including the Microsoft Office Blogs site. In a message on Twitter, SEA accused Microsoft of selling customer data to governments, which was probably a reference to disclosures last year by former U.S. National Security Agency contractor, Edward Snowden, that Internet companies were allegedly providing access to real-time customer data to the agency.Microsoft receives requests for customer data from law enforcement agencies around the world relating to Microsoft online and cloud services. Some of these are covered under “gag orders,” which do not allow the company to disclose to the public the existence of the specific requests.In March last year it started publishing its Law Enforcement Requests Report, which listed the total number of requests it receives from law enforcement agencies in countries around the world and the number of potentially affected accounts identified in those requests. Microsoft, Google and some other Internet companies have asked the Foreign Intelligence Surveillance Court for permission to provide aggregate data on security information requests under the Foreign Intelligence Surveillance Act, which they are currently disallowed.John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John’s e-mail address is john_ribeiro@idg.com Related content news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO CSO and CISO C-Suite news Cybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirements Open letter claims current provisions will create new threats that undermine the security of digital products and individuals. By Michael Hill Oct 03, 2023 4 mins Regulation Compliance Vulnerabilities opinion Cybersecurity professional job-satisfaction realities for National Cybersecurity Awareness Month Half of all cybersecurity pros are considering a job change, and 30% might leave the profession entirely. CISOs and other C-level execs should reflect on this for National Cybersecurity Awareness Month. By Jon Oltsik Oct 03, 2023 4 mins CSO and CISO Careers feature The value of threat intelligence — and challenges CISOs face in using it effectively Knowing the who, what, when, and how of bad actors and their methods is a boon to security, but experts say many teams are not always using such intel to their best advantage. By Mary K. Pratt Oct 03, 2023 10 mins CSO and CISO Advanced Persistent Threats Threat and Vulnerability Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe