Microsoft Says SolarWinds Hackers Accessed Some of Its Source Code
Reading Time: 1 Minute
style=”display:block”
data-ad-client=”ca-pub-6620833063853657″
data-ad-slot=”8337846400″
data-ad-format=”auto”
data-full-width-responsive=”true”>
style=”display:block”
data-ad-client=”ca-pub-6620833063853657″
data-ad-slot=”8337846400″
data-ad-format=”auto”
data-full-width-responsive=”true”>
During the course of the probe into the hack, Microsoft had previously admitted to detecting malicious SolarWinds binaries in its own environment but denied its systems were used to target others or that attackers had access to production services or customer data.
Several other companies, including Cisco, VMware, Intel, NVIDIA, and a number of other US government agencies, have since discovered markers of the Sunburst (or Solorigate) malware on their networks, planted via tainted Orion updates.
The Redmond-based company said its investigation is still ongoing but downplayed the incident, adding “viewing source code isn’t tied to elevation of risk” and that it had found evidence of attempted activities that were neutralized by its protections.
See Also: Offensive Security Tools: FireEye Red Team Tool Countermeasures
style=”display:block”
data-ad-client=”ca-pub-6620833063853657″
data-ad-slot=”8337846400″
data-ad-format=”auto”
data-full-width-responsive=”true”>
>
In a separate analysis published by Microsoft on December 28, the company called the attack a “cross-domain compromise” that allowed the adversary to introduce malicious code into signed SolarWinds Orion Platform binaries and leverage this widespread foothold to continue operating undetected and access the target’s cloud resources, culminating in the exfiltration of sensitive data.
SolarWinds’ Orion software, however, wasn’t the only initial infection vector, as the US Cybersecurity and Infrastructure Security Agency (CISA) said the attackers used other methods as well, which have not yet been publicly disclosed.
style=”display:block”
data-ad-client=”ca-pub-6620833063853657″
data-ad-slot=”8337846400″
data-ad-format=”auto”
data-full-width-responsive=”true”>
See Also: Steganography – How images can hide secret messages in plain sight
The agency also released supplemental guidance urging all US federal agencies that still run SolarWinds Orion software to update to the latest 2020.2.1 HF2 version.
“The National Security Agency (NSA) has examined this version and verified that it eliminates the previously identified malicious code,” the agency said.
Source: thehackernews.com
(Click Link)