The threat actors behind the SolarWinds attack could breach internal Microsoft accounts to view the source code for Microsoft products.
Earlier this month, Microsoft confirmed that they detected malicious executables in their environment that were downloaded during the SolarWinds Orion platform supply chain attack.
In a blog post published today, Microsoft stated that they found no evidence that production services or customer data were breached, that forged SAML tokens were used against their domains, or that their systems were used to attack customers.
However, their investigations discovered that the attackers could compromise internal Microsoft accounts, with one being used to view the source code for their software. The attackers, though, did not have the required permissions to modify any source code or engineering systems.
"We detected unusual activity with a small number of internal accounts and upon review, we discovered one account had been used to view source code in a number of source code repositories. The account did not have permissions to modify any code or engineering systems and our investigation further confirmed no changes were made. These accounts were investigated and remediated," Microsoft stated in a blog post.
Microsoft further stated that they do not practice security through obscurity and do not consider the viewing of source code as a security risk.
Comments
Dodanonnone - 3 years ago
Obvious follow-up question:
Was it just luck the account didn't have edit privileges?
Just the thought of the same kind of software-update-piggy-back-attack on any MS products is sad.
geercom - 3 years ago
Thank you for the important coverage, Lawrence. With Microsoft products embedded across industries worldwide, the attack surface just grew by leaps and bounds.
ken_smon - 3 years ago
"do not consider the viewing of source code as a security risk."
Really?
doriel - 3 years ago
Seems supicious. I think its OK unless they could change that code and unless there are no "secret backdoor" implemented in the source code.
geercom - 3 years ago
Perhaps they are able to locate vulnerabilities in the source code by viewing it.