- Microsoft revealed that the SolarWinds hijackers were able to breach its security and gain access to sensitive source code, although they could not make any changes to it.
- The company said the hackers had no access to production services or customer data, and that the company’s systems were not used to attack other targets.
- Some security experts think that even a glance at source code information can provide information that can help with future attacks.
One of the worst things that happened last year was the massive Mid-December SolarWinds cap that had an impact on government agencies and Fortune 500 companies. Hackers try to attack like this all the time, but the SolarWinds attack is more dangerous because it is believed to be from Russia. The Kremlin may deny the operation, but experts have been pointing the finger at Russia since the early days of the investigation. More than two weeks after the hacks, Microsoft announced that the attackers could gain access to a critical piece of software, the source code, of one or more unknown products.
Microsoft explained in a blog post that the hackers could not edit the source code. But even just a glance at a source code from a company like Microsoft can be enough for hackers to develop new attacks that endanger other Microsoft products.
Today’s Top Deal Thanks to this Amazon coupon, the best selling respirators are on sale for only $ 2.12 each List price:$ 49.99 Price:$ 42.49 You save:$ 7.50 (15%)
BGR is available on Amazon and may receive a commission Available at Amazon BGR may receive a commission
When a nation-state launches the SolarWinds attack, access to the source code is even more important. Microsoft did not explain in its blog post what kind of source code was seen, so it is unclear what kind of software could be affected. Let’s not forget that Microsoft makes a lot of software other than just Windows. The company manufactures a lot of software, which explains why hackers will follow their secrets. The list includes the popular Office suite, as well as a variety of applications and cloud solutions. Many companies and government agencies rely on Microsoft software, and source code insights can provide attackers with new ways to bypass security solutions and push targets into future attacks.
Microsoft released its new findings on December 31, but Reuters reported that three people informed about the case said the software giant had known for days that its source code had been violated during the attack.
“The source code is the architectural blueprint of how the software is built,” Cycode’s Andrew Fife told the news organization. Cycode is an Israel based company that develops source code solutions. “If you have the blueprint, it’s much easier to design attacks.” Ronen Slavin, chief technology officer of Cycode, asked him what kind of source code was obtained. “For me, the biggest question is, ‘Was it again for the next major operation? ‘, Slavin asked.
This is how Microsoft describes the unauthorized access to the source code:
We detected unusual activity with a small number of internal accounts, and upon investigation, we discovered that one account was used to view source code in a number of source code repositories. The account did not have permission to change any code or engineering systems, and our investigation confirmed that no changes were made. These accounts have been examined and restored.
The company also explained that its investigation “found no evidence of access to production services or customer data. The investigation, which is ongoing, also found no indication that our systems were used to attack others. The FBI is also investigating the SolarWinds attacks.
Microsoft does not mention Russia in the post, but makes it clear that it believes it is fighting a ‘very sophisticated nation-state actor’.
The company also says it uses a philosophy of ‘assuming infringement’ in its security practices. It is an assumption that attackers will violate its security. The company also explained that it uses open source principles within the company to make source code visible within Microsoft. “This means that we do not rely on the confidentiality of source code for product security, and our threat models assume that attackers have knowledge of source code,” the company wrote. “Reading source code is therefore not related to the risk.”
Microsoft’s blog post is intended to reassure governments and customers, but the fact remains that hackers are in possession of the kind of secrets they do not have access to. Time will tell whether access to Microsoft’s source code will enable the same team of attackers to create even more sophisticated hacks.