See why it is so dangerous for SolarWinds hackers to access Microsoft’s source code – BGR

  • Microsoft revealed that SolarWinds hackers were able to breach its security and access confidential source code, although they were unable to make any changes to it.
  • The company said that hackers did not access production services or customer data, and that the company’s systems were not used to attack other targets.
  • Some security experts think that even a look at the source code data can provide information that can help with future attacks.

One of the worst things that happened last year was the massive SolarWinds hack in mid-December, which affected government agencies and Fortune 500 companies. Hackers try attacks like this all the time, but the SolarWinds attack is more dangerous because it believes it is said to have originated from Russia. The Kremlin may deny the operation, but experts have already pointed the finger at Russia since the early days of the investigation. More than two weeks after the hacks, Microsoft revealed that attackers were able to access critical software, the source code for one or more undisclosed products.

Microsoft explained in a blog post that hackers were unable to modify the source code. But even a simple look at the source code of a company like Microsoft can be enough for hackers to develop new attacks that compromise other Microsoft products.

Best deal of the day Best-selling respirators are on sale for just $ 2.12 each, thanks to this Amazon coupon List price:$ 49.99 Price:$ 42.49 You save:$ 7.50 (15%) Available on Amazon, BGR can receive a commission Buy now Available on Amazon BGR can receive a commission

If a nation-state initiated the SolarWinds attack, access to the source code is even more important. Microsoft did not explain in its blog what kind of source code was seen, so it is not clear what type of software can be affected. Let’s not forget that Microsoft makes a lot of software besides Windows. The company produces tons of software, which explains why hackers would go after its secrets. The list includes the popular Office suite, as well as a variety of applications and cloud solutions. Many companies and government agencies rely on Microsoft software, and insights from the source code can offer attackers new ways to bypass security solutions and penetrate targets in future attacks.

Microsoft published its new findings on December 31, but Reuters reports that three people informed about the matter said that the software giant had known for days that its source code had been breached during the attack.

“The source code is the architectural design of how the software is built,” Andrew Fife of Cycode told the news agency. Cycode is a company based in Israel that develops source code solutions. “If you have the plan, it is much easier to engineer attacks.” Cycode’s chief technology officer, Ronen Slavin, questioned what kind of source code was accessed. “For me, the biggest question is, ‘Was that recognition for the next big operation?'” Asked Slavin.

This is how Microsoft described unauthorized access to the source code:

We detected unusual activity with a small number of internal accounts and, upon review, we found that an account was used to view the source code in various source code repositories. The account was not allowed to modify any engineering code or systems, and our investigation confirmed that no changes were made. These accounts have been investigated and corrected.

The company also explained that its investigation found “no evidence of access to production services or customer data. The investigation, which is ongoing, also found no evidence that our systems were used to attack other people. ”The FBI is also investigating the SolarWinds attacks.

Microsoft did not name Russia in the position, but made it clear that it believes it is fighting “a very sophisticated nation-state actor”.

The company also says it employs an “assumed violation” philosophy in its security practices. It is an assumption that attackers will breach your security. The company also explained that it uses open source principles within the company to make the source code visible at Microsoft. “This means that we do not have source code confidentiality for product security, and our threat models assume that attackers are aware of the source code,” wrote the company. “Therefore, viewing the source code is not linked to increased risk.”

The Microsoft blog post is intended to reassure governments and customers, but the fact is that hackers may be in possession of the kind of secrets they shouldn’t have access to. Time will tell if gaining access to Microsoft’s source code will allow the same team of attackers to create even more sophisticated hacks.

Chris Smith started writing about gadgets as a hobby and, before he knew it, was sharing his views on technology with readers around the world. Whenever he’s not writing about gadgets, he fails miserably to stay away from them, although he tries desperately. But this is not necessarily a bad thing.

.Source