News

Microsoft Internal Solorigate Investigation Update: SolarWinds hackers accessed Microsoft source code

software updates

On Thursday, Microsoft disclosed details of the investigation into the SolarWinds attack in a blog post. It is known that hackers have launched extensive cyberattacks on many government agencies and private companies, and even the source code of software giants has not been spared.

Specifically, an investigation revealed a small amount of unusual activity on its internal accounts, and one of the accounts has been used to view the source code in many code repositories.

It is reported that as the core of software competitiveness, Microsoft has been committed to protecting its source code. But at the same time, the company has also opened access rights to some special-qualified customers and government partners for reference and debugging.

Fortunately, the source code of the account involved cannot be modified, and the company’s services and customer data are not threatened. The company said: “The ongoing investigation has not found any signs that our system has been used to attack other systems.”

Previous investigations pointed the finger at large-scale operations carried out by Russian intelligence agencies. It is said that hackers invaded SolarWinds’ IT management software at the beginning of the year and inserted malicious code in the software update (Orion).

SolarWinds revealed that approximately 18,000 customers have deployed the update on their systems, and it has also affected the e-mail system used by senior leaders of the US Department of the Treasury. The US National Security Agency determined that this matter will have a significant and continuous impact.

In addition, according to the analysis of Microsoft and the security company FireEye, the two systems are not immune, which means that the attacker can have extensive access to the affected system.

Earlier, Microsoft said it had identified more than 40 customers who were hacked. As the investigation deepens, there will be more worrisome information disclosures.

(Via)

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

The Latest

To Top