A Microsoft spokesperson declined to say which source code the hackers viewed.
Microsoft Corp. said that the alleged Russian hackers behind the staggering violation of numerous US government agencies also accessed the company’s internal source code, although no data or customer service was compromised.
“We detected unusual activity with a small number of internal accounts and upon examination, we found that an account had been used to view source code in a number of source code repositories,” Microsoft said Thursday in a report. blog post updating its ongoing investigation into the attack. “The account was not authorized to change any code or engineering systems and our investigation confirmed that no changes had been made.”
A Microsoft spokesperson declined to say which source code the hackers viewed. Source code shows how computer programs work and is used to create products. Access to such code could have given hackers valuable information on how they could exploit programs or escape detection. Microsoft has said that its security philosophy, or “threat model,” calls for its source code to be visualized and defenses built with that in mind.
Microsoft previously said it had also received a malicious software update from information technology provider SolarWinds Corp. which has been used to rape government agencies and businesses around the world. Details of the campaign are still largely unknown, including the number of victimized organizations and what was taken by the hackers. Bloomberg News reported in December that investigators had determined that at least 200 organizations had been attacked as part of the campaign.
Microsoft said the hackers did not use the SolarWinds update to access the internal account, but declined to say how the attackers gained access. The company also did not specify in the blog post which code repositories were accessed, or how long the hackers remained inside the company network, but reiterated that there is no indication that his systems were used to attack others.
“This activity has not jeopardized the security of our services or customer data, but we want to be transparent and share what we learn as we fight what we believe to be a very sophisticated state actor,” said declared the company. .