Miami Herald

Microsoft says Russian hackers viewed some of its source code

- BY NICOLE PERLROTH

Microsoft said Thursday that the far-reaching Russian hack of U.S. government agencies and private corporatio­ns went further into its network than the company had previously understood.

While the hackers, suspected to be working for Russia’s SVR intelligen­ce agency, did not appear to use Microsoft’s systems to attack other victims, they were able to view Microsoft source code by accessing an employee account, the company said.

Microsoft said the hackers were unable to access emails or its products and services, and that they were not able to modify the source code they viewed. It did not say how long hackers were inside its networks or which products’ source code had been viewed. Microsoft had initially said it was not breached in the attack.

“Our investigat­ion into our own environmen­t has found no evidence of access to production services or customer data,” the company said in a blog post. “The investigat­ion, which is ongoing, has also found no indication­s that our systems were used to attack others.”

The hack, which may be ongoing, appears to have begun as far back as October 2019. That was when hackers first breached the

Texas company SolarWinds, which provides technology­monitoring services to government agencies and 425 of the Fortune 500 companies. The compromise­d software was then used to penetrate the Commerce, Treasury, State and Energy Department­s, along with FireEye, a top cybersecur­ity firm that first revealed the breach this month.

Investigat­ors are still trying to understand what the hackers stole, and ongoing investigat­ions suggest the attack is more widespread than initially believed. In the past week, CrowdStrik­e, a FireEye competitor, announced that it too had been targeted, unsuccessf­ully, by the same attackers. In that case, the hackers used Microsoft resellers, companies that sell software on Microsoft’s behalf, to try to access it systems.

The Department of Homeland Security has confirmed that SolarWinds was only one of several avenues that the Russians used to attack U.S. agencies, technology and cybersecur­ity companies.

President Donald Trump has publicly suggested that China, not Russia, may have been the culprit behind the hack — a finding that was disputed by Secretary of State Mike Pompeo and other senior members of the administra­tion. Trump has also privately called the attack a “hoax.”

President-elect Joe Biden has accused Trump of downplayin­g the hack and has said his administra­tion will not be able to trust the software and networks that federal agencies rely on to conduct business.

Ron Klain, Biden’s chief of staff, has said the administra­tion plans a response that goes beyond sanctions.

“Those who are responsibl­e are going to face consequenc­es for it,” Klain told CBS last week. “It’s not just sanctions. It’s also steps and things we could do to degrade the capacity of foreign actors to repeat this sort of attack or, worse still, engage in even more dangerous attacks.”

Security experts said the hack’s scope cannot yet be fully known. SolarWinds has said its compromise­d software made its way into 18,000 of its customers’ networks. While SolarWinds, as well as Microsoft and FireEye, have said they believe that the number of actual victims may be limited to the dozens, ongoing investigat­ions suggest the number could be much larger.

“This hack is a lot worse and more impactful than we realize today,” said Dmitri Alperovitc­h, the chair of the Silverado Policy accelerato­r and former chief technology officer at CrowdStrik­e. “We should brace ourselves for many more shoes to drop still over the coming months.”

American officials are still trying to understand whether the hack was traditiona­l espionage, akin to what the National Security Agency does to foreign networks, or whether the Russians placed so-called back doors into systems at government agencies, major corporatio­ns, the electric grid and U.S. nuclear weapons labs, for future attacks.

Officials believe the hack stopped at unclassifi­ed systems but worry about sensitive unclassifi­ed data that the hackers may have accessed.

Microsoft, unlike many technology companies, does not rely on the secrecy of its source code for the security of its products. Employees can readily view source code, and its risk models assume attackers have ready access to it, suggesting the fallout from the breach could be limited.

 ?? JONATHAN WEISS Dreamstime/TNS, file 2018 ?? Microsoft said the hackers were unable to access emails or its products and services, and that they were not able to modify the source code they viewed. It did not say which products’ source code had been viewed.
JONATHAN WEISS Dreamstime/TNS, file 2018 Microsoft said the hackers were unable to access emails or its products and services, and that they were not able to modify the source code they viewed. It did not say which products’ source code had been viewed.

Newspapers in English

Newspapers from United States