Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream.
(Reuters) — The hackers behind the worst intrusion of U.S. government agencies in years won access to Microsoft’s secret source code for authenticating customers, potentially aiding one of their main attack methods.
Microsoft said in a blog post on Thursday that its internal investigation had found the hackers studied parts of the source code instructions for its Azure cloud programs related to identity and security, its Exchange email programs, and Intune management for mobile devices and applications.
Some of the code was downloaded, the company said, which would have allowed the hackers even more freedom to hunt for security vulnerabilities, create copies with new flaws, or examine the logic for ways to exploit customer installations.
Microsoft had said before that the hackers had accessed some source code but had not said which parts or that any had been copied.
U.S. authorities said Wednesday the breaches revealed in December extended to nine federal agencies and 100 private companies, including major technology providers and security firms. They said the Russian government is likely behind the spree, which Moscow has denied.
Initially discovered by security provider FireEye, the hackers used advanced skills to insert software backdoors for spying into widely used network-management programs distributed by Texas-based SolarWinds.
For the most prized of the thousands of SolarWinds customers that were exposed last year, the hackers added new Azure identities, added greater rights to existing identities, or otherwise manipulated the Microsoft programs, largely to steal email.
Some hacking also used such methods at targets that did not use SolarWinds. Microsoft previously acknowledged that some of its resellers, which often have continual access to customer systems, had been used in the hacks. The company continues to deny that flaws in anything it provides directly have been used as an initial attack vector.
Microsoft declined to answer Reuters’ questions about which parts of its code had been downloaded or whether what the hackers discovered would have helped them hone techniques.
The company also declined to say whether it was changing any of its code as a result of the breach.
The Department of Homeland Security did not respond to questions.
The company said Thursday it had completed its probe and that it had “found no indications that our systems at Microsoft were used to attack others.”
Nevertheless, the problems with identity management have proved so pervasive in the recent attacks that multiple security companies have issued new guidelines and warnings, as well tools for detecting misuse.
U.S. President Joe Biden has promised a response to the SolarWinds hacks, and an inquiry and remediation effort is being led by his top cybersecurity official, Deputy National Security Advisor Anne Neuberger.
The Senate Intelligence Committee will hold a hearing on the hacks Tuesday, with witnesses including Microsoft president Brad Smith and FireEye CEO Kevin Mandia.
(Reporting by Joseph Menn; editing by Jonathan Oatis and Christopher Cushing.)
VentureBeatVentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative technology and transact. Our site delivers essential information on data technologies and strategies to guide you as you lead your organizations. We invite you to become a member of our community, to access:
- up-to-date information on the subjects of interest to you
- our newsletters
- gated thought-leader content and discounted access to our prized events, such as Transform 2021: Learn More
- networking features, and more