TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

SolarWinds hackers were able to access Microsoft source code

676 pointsby accountinhnover 4 years ago

29 comments

Trisellover 4 years ago
I predict a rash of eventual FireEye, Cisco, and other vendor zero days in the near to mid future. If you are a nation state actor what better way to find zero days then to get the source code and find the bugs to exploit. This is the only thing that makes sense that would be worth the risk of attacking companies such as FireEye and Microsoft.
评论 #25599210 未加载
评论 #25600992 未加载
评论 #25597277 未加载
a-dubover 4 years ago
the only interesting part of this whole debacle in my mind is that it highlights what was already fairly obvious. the security of a given environment is only as secure as its weakest link. the entire supply chain for every bit of code that is installed on a machine is a potential vector. if that code happens to run at privilege (like administration software) that vector is shorter. (and that&#x27;s only if you&#x27;re considering software) when you think about it, it&#x27;s staggering.<p>i suspect we&#x27;ll be seeing a lot more attention on reproducible and cryptographically secure build environments, similar to the gitian stuff in bitcoin land.
评论 #25612691 未加载
vthallamover 4 years ago
&gt; This means we do not rely on the secrecy of source code for the security of products, and our threat models assume that attackers have knowledge of source code. So viewing source code isn’t tied to elevation of risk<p>I don&#x27;t know how much of this is true. Wouldn&#x27;t it be helpful for bad actors to understand how Windows defenses work looking at the code thereby increasing the risk?
评论 #25596495 未加载
评论 #25595892 未加载
评论 #25595799 未加载
评论 #25595923 未加载
评论 #25597479 未加载
评论 #25595814 未加载
评论 #25596781 未加载
评论 #25596512 未加载
评论 #25595783 未加载
评论 #25597741 未加载
评论 #25596490 未加载
tomcamover 4 years ago
Practically speaking, being a bad guy with access to Microsoft source code for a short time has very little impact or real-world relevance. They do thousands of updates a day, the build processes are lengthy and poorly documented, the overall direction of the code is subject to myriad political groups inside the company, and they&#x27;re making massive improvements in multiple branches that will render that snapshot irrelevant within minutes.<p>The &quot;best&quot; market for any such code would be... what... China? Other than the possibility of figuring out potential hacks who could make use of the code in in its sheer mass? By the time you figure out something clever your version of the code is hopelessly out of date.
评论 #25599785 未加载
评论 #25599935 未加载
frombodyover 4 years ago
Very curious as to the details they aren&#x27;t releasing.<p>If you read between the lines they are saying that accounts were compromised, but not through token stealing, which means the attackers got the passwords to the accounts, and likely skirted MFA requirements because they were already inside, or there were none.<p>While there are many avenues to steal passwords once you have the foothold the attackers did, it would be interesting to know the details as to how these particular accounts were compromised.
评论 #25596747 未加载
评论 #25596837 未加载
userbinatorover 4 years ago
If they were the ones responsible for leaking the XP source not long ago, then they deserve much thanks from the underground retrocomputing and software preservation community --- MS would&#x27;ve likely never opened that source themselves. In the same way that those who leak schematics and service information to enable third-party repair are also to be commended. &quot;An enemy of an enemy is a friend.&quot;
评论 #25599748 未加载
评论 #25600265 未加载
thatsamonadover 4 years ago
Though this is bad for Microsoft, does it make the situation substantially worse from a security perspective? Assuming they’re following good practices like not storing access keys, passwords, etc, in their source control system(s), this seems like more of an IP protection issue.<p>I could be wrong about that, though, and I’d be curious to learn and understand more.
评论 #25596575 未加载
评论 #25595700 未加载
评论 #25595704 未加载
评论 #25596565 未加载
netfortiusover 4 years ago
Funny usage of the MS defender for the link to the &quot;inner source&quot; wikipedia entry:<p><a href="https:&#x2F;&#x2F;nam06.safelinks.protection.outlook.com&#x2F;?url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FInner_source&amp;data=04%7C01%7Crmcree%40microsoft.com%7C3c2b93314b6a4c82230608d8ada9c8dd%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637450292021293272%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=XfTuzoczzfzFR6DNm73DwrWSDpHPeMvWqTmBMFZVXzI%3D&amp;reserved=0" rel="nofollow">https:&#x2F;&#x2F;nam06.safelinks.protection.outlook.com&#x2F;?url=https%3A...</a>
评论 #25598416 未加载
评论 #25597579 未加载
juanbyrgeover 4 years ago
Is the source code buildable, or is it mainly for documentation purposes? I’m guessing the build system and tool chains required for building windows are massively complex. Are these distributed with the windows source code as well?<p>Also I’m guessing that there are a lot of other proprietary vendor-supplied pieces that get built with Windows. What happens if these are not available?
评论 #25596715 未加载
asahover 4 years ago
closed source = only the badguys get to see it. :-(
codezeroover 4 years ago
I don&#x27;t know if I missed it in the article, but did they say anything explicit about write access? Seeing the source may give access to new zero days, but it would be much worse if the attackers were able to seed a large number of commits into the code that introduce subtle vulnerabilities.
评论 #25595748 未加载
评论 #25596050 未加载
评论 #25596476 未加载
评论 #25595815 未加载
评论 #25595796 未加载
cs702over 4 years ago
Reading this, the question that immediately pops in my head is:<p>Could a hack like this one go undetected for so long in a widely used free&#x2F;open-source project developed in the open, such as the Linux kernel?<p>While I have no doubt that something like this could happen to the Linux kernel source code (because security is Capital-H Hard), my perception is that something like this is less likely to happen to the Linux kernel -- and, were it to happen, it would likely be detected sooner, due to the inherent <i>transparency</i> of widely used open-source code.
评论 #25597351 未加载
评论 #25596805 未加载
评论 #25597013 未加载
评论 #25597228 未加载
评论 #25597500 未加载
评论 #25596824 未加载
评论 #25597201 未加载
评论 #25599051 未加载
评论 #25596835 未加载
8bitsruleover 4 years ago
There&#x27;s a very old homily that applies exactly to this flaming debacle: don&#x27;t put all your eggs in one basket.<p>WP says that SolarWinds &quot;had about 300,000 customers as of December 2020, including nearly all Fortune 500 companies and numerous federal agencies.&quot;<p><i>Everyone</i> who thought that was a good idea, for whatever reasons - given the history of security - obviously screwed up badly. When -so many people- go -so wrong-, the problem is clearly bigger than the loss of &#x27;too many secrets&#x27;.
rychcoover 4 years ago
I would love to have access to NT source code, hopefully it leaks. The most recent leaks are way out of date and have basically been exhausted of their usefulness.
Stierlitzover 4 years ago
What&#x27;s the logic of using the same remote monitoring software on &quot;computers&quot; used by the intelligence community.
pmlnrover 4 years ago
It&#x27;s simple: open source Microsoft, then this is not an attack vector any more ;)
shallowthoughtover 4 years ago
Of course, it absolutely HAS to be a nation-state. There&#x27;s just no way anybody not being paid millions of dollars could possibly break their ironclad blah blah whatever you get it
iam-TJover 4 years ago
Many comment threads here discussing the (in)ability of an attacker to modify the source-code that Microsoft builds from, or use it to more easily discover vulnerabilities.<p>What I&#x27;ve not seen anyone discuss is the potential for an attacker to take the source-code of a single Windows core component (a system DLL for example), add in a backdoor, build it and then distribute the binary via a compromise such as the SolarWinds update mechanism.<p>In other words, insert a modified core Windows DLL into some other popular Windows driver or application package updater published and signed via a &#x27;trusted&#x27; channel other than Microsoft itself.
评论 #25602297 未加载
LockAndLolover 4 years ago
If they had also inserted themselves into the update chain, things would&#x27;ve been a little worse.
cogman10over 4 years ago
I wonder if incidents like this will push MS towards open sourcing windows.<p>IDK what their revenue looks like, but I&#x27;m guessing that selling the OS isn&#x27;t as front and center as it used to be (from the way they are changing in terms of supporting things like linux).<p>Even if they keep a pretty tight license around the source, releasing it to the public would earn a lot of good will while potentially finding and fixing security problems.
评论 #25596238 未加载
评论 #25596373 未加载
评论 #25596070 未加载
评论 #25596160 未加载
评论 #25596653 未加载
gafferongamesover 4 years ago
&gt; SolarWinds hackers were able to access Microsoft source code<p>Are they OK? Ze googles, they do nothing
OpticalWindowsover 4 years ago
Nobody has a choice but to trust microsoft. Amazing.
jtchangover 4 years ago
On the whole this does not affect my perception of Microsoft. In fact it probably tilts it in their favor. They were able to conduct a thorough investigation and figure out the attackers had access to the source. The reality is that while it makes future attacks easier it has already been taken into account for a large majority of risk assessments.<p>People trash Microsoft a lot but some of the people there are the best in their respective fields.
评论 #25596872 未加载
评论 #25596808 未加载
评论 #25597493 未加载
评论 #25598027 未加载
评论 #25599560 未加载
评论 #25596875 未加载
评论 #25596825 未加载
评论 #25597725 未加载
BrentOzarover 4 years ago
Here&#x27;s the updated Microsoft post that contains the admission that the hackers viewed source code:<p><a href="https:&#x2F;&#x2F;msrc-blog.microsoft.com&#x2F;2020&#x2F;12&#x2F;31&#x2F;microsoft-internal-solorigate-investigation-update&#x2F;" rel="nofollow">https:&#x2F;&#x2F;msrc-blog.microsoft.com&#x2F;2020&#x2F;12&#x2F;31&#x2F;microsoft-interna...</a><p>Drives me crazy that Reuters could write an entire post about a Microsoft blog post, yet not link to the post itself.
评论 #25595863 未加载
评论 #25596371 未加载
评论 #25595820 未加载
评论 #25596126 未加载
HatchedLake721over 4 years ago
Original blog post by Microsoft - <a href="https:&#x2F;&#x2F;msrc-blog.microsoft.com&#x2F;2020&#x2F;12&#x2F;31&#x2F;microsoft-internal-solorigate-investigation-update&#x2F;" rel="nofollow">https:&#x2F;&#x2F;msrc-blog.microsoft.com&#x2F;2020&#x2F;12&#x2F;31&#x2F;microsoft-interna...</a>
natasover 4 years ago
I&#x27;m sure they got linux&#x27;s too.
jeffrallenover 4 years ago
Poor hackers. I hear Visene soothes bleeding eyes.
评论 #25596607 未加载
HenryKissingerover 4 years ago
&gt; Microsoft said the account did not have the ability to monitor any Microsoft code. The blog post further added it has found no evidence of access “to production services or customer data.”<p>The article is in contradiction with the headline, isn&#x27;t it?
评论 #25595694 未加载
评论 #25595653 未加载
f430over 4 years ago
This seems like a very serious breach. Expect zero-days to run rampant the next 10 years.<p>I don&#x27;t know if to pat Microsoft on the back or give the ma scolding.<p>If you are up against a military intelligence hell bent on discovering attack vectors produced by the private commercial industry then this is a losing battle-whoever has infinite resources win.<p>In this case the governments of the world can print unlimited money and has to access to the top of the creme, we are talking 0.0001% of the population working on discovering the next zero day vulnerability.<p>How does a for profit corporation go up against an adversary with infinite resources?
评论 #25599699 未加载
评论 #25599500 未加载