Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Group Behind Alleged Russia Hack Broke Into Microsoft's Internal Systems
NPR ^ | December 31, 2020ยท4:49 PM ET | Bobby Allyn

Posted on 12/31/2020 3:51:54 PM PST by BenLurkin

The group behind the suspected Russian attack into U.S. government agencies and private companies was able to hack into Microsoft's internal systems and access some of the company's source code, the tech giant said in a blog post on Thursday.

Microsoft had previously said it was among thousands of companies that discovered malware on its systems after downloading a routine software update from the company SolarWinds containing a possible "backdoor" for hackers to gain access to sensitive company data.

But the admission on Thursday is the first time Microsoft acknowledged that the attackers had successfully broken into the company's systems and had viewed source code, the carefully guarded DNA of the company's software products.

"We detected unusual activity with a small number of internal accounts and upon review, we discovered one account had been used to view source code in a number of source code repositories," the company said. "The account did not have permissions to modify any code or engineering systems and our investigation further confirmed no changes were made. These accounts were investigated and remediated."

Dmitri Alperovitch, a cybersecurity expert and chairman of Silverado Policy Accelerator, a Washington-based think tank, said while the breach appears to be a "serious issue" and can potentially make it easier for attackers to uncover additional vulnerabilities at Microsoft, the company's worst fears were not realized.

"This attack was not as bad as it could have been for Microsoft," Alperovitch said. "If they had modified the source code, or used it to introduce new backdoors, since Microsoft has billions of users out there in pretty much every organizations all around the planet, that would've been a very severe, very grave concern," he said. "But that doesn't appear to be the case."

Many facts remain unknown about how the cyber attackers targeted Microsoft. It did not say what products the viewed source code was tied to, or how long the hackers were able to stay within the company's systems.

"Is it Microsoft Cloud Services? Is it their Windows operating system? Is it Microsoft Office? That would be very helpful to know to understand what source code was accessed and what vulnerabilities may be in that source code now," Alperovitch said.

David Kennedy, who runs the Ohio-based company TrustedSec LLC, which investigated the hack, offered additional questions.

"Does this impact authentication mechanisms and how usernames and passwords are protected? Are they in the operating system side of the house or future projects? These are key things we need to understand to know how deep this goes," Kennedy said. "The more access they had, the greater potential damage there is in the future." In its blog post, Microsoft downplayed the significance of the attackers reading its source code, saying, unlike other tech companies, employees at the company have an "open source-like culture" to viewing source code within the firm. "So viewing source code isn't tied to elevation of risk," the company said.

That may be true, said security expert Kennedy, but having a group of malicious hackers from a foreign country reading a company's source code is a completely different matter.

"Those are typically trusted employees within an organization that have access to source code and aren't looking at it from an adversary's perspective, " he said. "This can be used by adversaries later on to launch additional attacks."

Investigators are still probing the far-reaching attack, which has been traced back to October and compromised 18,000 private and government users who inadvertently downloaded a tainted software update from the Texas firm SolarWinds.

U.S. agencies including the Departments of State, Treasury, Commerce, Energy and Homeland Security were compromised.

But, as expert Alperovitch notes, what exactly the suspected Russian agents stole is still a mystery.

"This is just one more shoe to drop," he said. "There will be many more in the coming months. We'll learn about more victims, more data that was taken. So we're just in the very early innings of this investigation."


TOPICS: Computers/Internet
KEYWORDS: alperovitch; crowdstrike; davidkennedy; dmitrialperovitch; microsoft; obama; solarwinds; sourcecode; speedwaybomber; texas; trustedsec
Navigation: use the links below to view more comments.
first previous 1-2021-23 last
To: MAGAthon

Also the guy working with the Speedway Bomber...IIRC.


21 posted on 01/06/2021 2:02:49 AM PST by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 3 | View Replies]

To: MAGAthon

Also the guy working with the Speedway Bomber...IIRC. Or maybe he worked with the Ukrainian gal who was, I forget.


22 posted on 01/06/2021 2:04:19 AM PST by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Fedora

good catch.


23 posted on 01/07/2021 12:45:51 AM PST by piasa (Attitude adjustments offered here free of charge)
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-23 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson