Microsoft Concludes Internal Investigation into Solorigate Breach

  /     /     /  
Publicated : 23/11/2024   Category : security


Microsoft Concludes Internal Investigation into Solorigate Breach


The software giant found no evidence that attackers gained extensive access to services or customer data.



Microsoft, which calls the SolarWinds supply chain attack a moment of reckoning, declared on Thursday it had completed an internal investigation of its own compromised network. It advises companies to strengthen security by adopting a zero trust mindset and protecting privileged credentials.
While the breach, which Microsoft calls Solorigate, allowed sophisticated attackers to view source code for some of its products, Microsoft stressed that its investigators concluded neither the companys services nor its software had been used to attack others.
The 
closing of this investigation
 comes less than two months after Microsoft revealed that attackers had 
viewed some of the source code for its products and services
. In a separate statement on Feb. 18, the Microsoft Security Response Center (MSRC) disclosed the attackers viewed specific source code repositories looking for passwords and development secrets used as keys to secure applications once compiled.
Microsofts investigation found that only a small number of [code] repositories were accessed by the intruders, including a small subset of Azure, Intune, and Exchange components.
The search terms used by the actor indicate the expected focus on attempting to find secrets, the MSRC 
states in its blog post
, adding that company policy prohibits any passwords or code-signing secrets in code. Microsoft automates verification of this policy, but double-checked the code during incident response. We have confirmed that the repositories complied and did not contain any live, production credentials, officials write.
Vasu Jakkal, corporate vice president for security, compliance, and identity at Microsoft, noted the fact that security companies and large software firms were clearly targeted by the attackers should worry the industry and customers.
Today, as we close our own internal investigation of the incident, we continue to see an urgent opportunity for defenders everywhere to unify and protect the world in a more concerted way, she writes. We also see an opportunity for every company to adopt a Zero Trust plan to help defend against future attacks.
The speed with which Microsoft wrapped its investigation caused some security professionals to question the companys thoroughness. Incident responders are in the tough position of having to declare a negative — that attackers did not gain significant access, says Joe Slowik, senior threat researcher with network infrastructure firm DomainTools.
It does seem like this didnt take very long for them to finish up, given the length of time compared to the potential level of access that the attackers were able to achieve in the victims networks, he says. Microsoft saying that [the attackers] didnt get access — full stop — seems very fast.
While acknowledging that Microsoft is in a better position to make such declarations, compared to most of the industry, Slowik questioned the wisdom in declaring the investigation over. 
Microsoft focused much of its conclusions on advising companies that two measures could make them more secure: Adopting a zero trust mindset and protecting the privileged accounts that attackers strive to compromise. While these have long been recommendations for IT security teams, especially as companies move to distributed workforces linked with cloud based services, Microsoft stressed that sophisticated attackers will target access and credentials. 
The cybersecurity industry has long been aware that sophisticated and well-funded actors were theoretically capable of advanced techniques, patience, and operating below the radar, but this incident
has proven that it isnt just theoretical
, the MSRC writes in its conclusions. For us, the attacks have reinforced two key learnings that we want to emphasize — embracing a zero trust mindset and protecting privileged credentials.
Industry professionals criticized Microsofts touting of cloud services as self-serving but lauded the companys focus on adopting a zero trust architecture.
The adoption of a zero trust architecture was something that had already been accelerating in light of the pandemic and the new normal of working from home, Oliver Tavakoli, chief technology officer at Vectra. Microsoft points out that organizations should go one step further by adopting it as a mindset [and] accept that all of the initial lines of defense can fail and that security controls need to be layered across all systems critical to an organization.
DomainTools Slowik argued that companies should focus on gaining visibility into their trust relationships. While zero trust has become overused in cybersecurity firms marketing, he says, the essence of the recommendations are valid.
Zero trust is a problematic concept — more a buzzword than truly useful — but it does highlight a trend that adversaries are increasingly able and willing to abuse trust relationships, Slowik says. The upshot for defenders and network owners is that we need to better at monitoring, defending, and controlling those trust relationships.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Microsoft Concludes Internal Investigation into Solorigate Breach