Microsoft says SolarWinds hackers viewed source code

Microsoft says SolarWinds hackers viewed source code

msft, microsoft-logo-2

Microsoft says hackers were able to access its source code.

James Martin / CNET

The company said on Thursday that hackers who carried out sophisticated cyber attacks on government agencies in the US and private companies were able to use Microsoft’s source code.

A Microsoft post stated in a blog post, “unusual activity with a small number of internal accounts” and “one account was used to view multiple source code of source code”. Microsoft stated that the account did not have the ability to modify the code and that no company service or customer data was endangered.

Microsoft enthusiastically protects its source code, the foundation of its software, but the company provides access to some “qualified” customers, governments, and partners for debugging and reference purposes.

“The investigation, which is ongoing, has also not indicated that our system was used to attack others,” the company said.

Read more: SolarWinds Hack Continues Spread: What You Need to Know

A Russian intelligence agency is suspected of carrying out a large-scale campaign that allegedly affected an email system used by senior leadership in the Treasury Department. It started earlier this year when hackers signed up with SolarWinds for IT management software. The Austin, Texas-based company sells software that allows an organization to see what’s happening on its computer network.

Hackers inserted malicious code into an update to a software called Orion. About 18,000 SolarWinds customers installed a compromise update on their systems, the company said.

US national security agencies have called the breach “significant and ongoing”. According to an analysis by Microsoft and security firm FireEye, which were both Infected, Gives hackers wider access to malware-affected systems.

Microsoft previously stated that it had identified More than 40 customers Which was targeted in the hack. More information about the hack and its aftermath is likely to emerge.

Read more: How to avoid a spear-phishing attack. 4 tips to keep you safe from timeless scams

Be the first to comment

Leave a Reply

Your email address will not be published.