Event JSON
{
"id": "6a33dff9ccbc27c9756f6b12fe69c7d5b2fad8f0d15644b88aa57b0f2e91e210",
"pubkey": "825f4f889131859e23d7b7e3333ac60e2bdac79658a237563969b0f69a6fd610",
"created_at": 1694025625,
"kind": 1,
"tags": [
[
"p",
"f7d0478e54eaa6e0cc98adf81d712148bce169a2c21b1c0f7a4ed446c6adc09e",
"wss://relay.mostr.pub"
],
[
"p",
"f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"wss://relay.mostr.pub"
],
[
"e",
"b47c605cb046b786e3bffb580db53fae3f1b0baeab0bf0b3d0d3694d0d8dec03",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/AlesandroOrtiz/statuses/111019663362273079",
"activitypub"
]
],
"content": "nostr:npub17lgy0rj5a2nwpnyc4hup6ufpfz7wz6dzcgd3crm6fm2yd34dcz0qlk9uux Since this was detected by an enterprise customer, I wonder if the key leak would have been detected by Microsoft if the attacker had only used it to access consumer accounts (as intended). That would have been quite bad by itself.",
"sig": "1c60c6cf649a2934dd1a8a607b8d2bea835138ec4390960dcd57de9dd333cb25e65e4b6433d47e3e87ad12009df35bfeb4163b5c4980629ea91ccd9307925129"
}