How the Wild Neutron APT Breached Microsoft’s Vulnerability Database in 2013

In 2013, a group known as Wild Neutron infiltrated Microsoft’s vulnerability reporting database, stole data, and remained undetected for months, prompting a month‑long patch effort and a quiet investigation that revealed no immediate exploitation of the leaked flaws.

ITPUB
ITPUB
ITPUB
How the Wild Neutron APT Breached Microsoft’s Vulnerability Database in 2013

Background

In 2013 Microsoft’s internal vulnerability reporting database was accessed without authorization. The breach was not disclosed publicly at the time.

Microsoft’s response

Microsoft spent more than a month patching every vulnerability listed in the compromised database. A third‑party security firm was engaged to search for any exploitation of the leaked data; no attacks linked to the disclosed flaws were found. Microsoft concluded that the risk to Windows users was limited because the vulnerabilities had been remediated before public disclosure.

Threat actor – Wild Neutron (also known as Morpho, Jripbot, Butterfly, ZeroWing, Sphinx Moth)

Wild Neutron is an economically motivated APT that targets large technology firms. In early 2013 the group compromised Microsoft, Twitter, Facebook and Apple.

Attack vector against Twitter and Facebook

The group leveraged the Java zero‑day vulnerability CVE‑2013‑0422. Attackers used social‑engineering to lure employees to a compromised forum (iphonedevsdk.com) that hosted an automated exploit tool. When a victim visited the site with a vulnerable Java runtime, the exploit executed remote code, giving the attackers foothold in the corporate network.

Post‑2013 activity

After a period of inactivity, Wild Neutron resurfaced in 2014‑2015 employing new large‑scale techniques, but details of those campaigns are outside the scope of this summary.

Victim distribution

The following chart shows the range of organizations targeted by Wild Neutron:

Wild Neutron victim distribution chart
Wild Neutron victim distribution chart

Comparison with similar incidents

Mozilla experienced a comparable breach of its vulnerability database in 2015 and publicly disclosed the incident, sharing details with stakeholders. Other notable breaches include Kaspersky Lab’s 2015 compromise by the Duqu 2.0 group (an APT linked to Israeli intelligence) and Bitdefender’s 2015 data leak, which was driven by a simple extortion attempt.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

MicrosoftAPTCVE-2013-0422cybersecurity breachvulnerability databaseWild Neutron
ITPUB
Written by

ITPUB

Official ITPUB account sharing technical insights, community news, and exciting events.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.