Microsoft said Thursday that the suspected Russian hackers behind a massive US government security breach also viewed some of the company’s source code.
The unauthorized access does not appear to have compromised any Microsoft (MSFT) services or customer data, the company said in a blog post.
But an investigation showed that the attackers took advantage of their access to Microsoft’s systems to view company code.
“We detected unusual activity with some internal accounts and upon review, we discovered one account had been used to view source code in a number of source code repositories,” Microsoft said.
“The account did not have permissions to modify any code or engineering systems and our investigation further confirmed no changes were made. These accounts were investigated and remediated.”
The disclosure highlights the broad reach of the attackers, whom investigators have described as extremely sophisticated and well-resourced. And it suggests that corporate espionage may have been as much a motive as a hunt for government secrets.
Source code represents the basic building blocks of computer programs. They are the instructions written by programmers that make up an application or computer program.
Microsoft had previously acknowledged using the IT management software, SolarWinds Orion, that gave the attackers a potential window into thousands of public and private sector organizations. But this marks the first time Microsoft has confirmed that the attackers exploited the vulnerability against the technology giant.
Mike Chapple, a former National Security Agency official and an information technology professor at the University of Notre Dame, said the attackers were likely looking for potential security vulnerabilities in Microsoft products that they could exploit to gain access to users of those products.
“Cybersecurity professionals now need to be concerned that this information falling into the wrong hands might create the next SolarWinds-level vulnerability in a Microsoft product,” Chapple said.
But Microsoft said its security practices begin by preemptively assuming that hackers already have access to the company’s source code, and protects its services accordingly.
“We do not rely on the secrecy of source code for the security of products, and our threat models assume that attackers have knowledge of source code,” the company said. “So viewing source code isn’t tied to elevation of risk.”