A Microsoft spokesperson declined to say which source code the hackers viewed.
“We detected unusual activity with a small number of internal accounts and upon examination, we found that an account had been used to view source code in a number of source code repositories,” Microsoft said Thursday in a report. blog post updating its continued investigation into the attack. “The account was not authorized to modify code or engineering systems and our investigation confirmed that no changes were made. ”
A Microsoft spokesperson declined to say which source code the hackers viewed. Source code shows how computer programs work and is used to create products. Access to such code could have given hackers valuable information on how they could exploit programs or escape detection. Microsoft has said that its security philosophy, or “threat model,” calls for its source code to be visualized and defenses built with that in mind.
Microsoft had previously said it also received a malicious software update from information technology provider SolarWinds Corp., which was used to violate government agencies and businesses around the world. Details of the campaign are still largely unknown, including the number of victimized organizations and what was taken by the hackers. Bloomberg News reported in December that investigators had determined that at least 200 organizations had been attacked as part of the campaign.
Microsoft said the hackers did not use the SolarWinds update to access the internal account, but declined to say how the attackers gained access. The company also did not specify in the blog post which code repositories were accessed or how long the hackers remained inside the company network, but reiterated that there is no indication that his systems were used to attack others.
“This activity has not jeopardized the security of our services or customer data, but we want to be transparent and share what we learn as we fight what we believe to be a very sophisticated state actor,” said declared the company. .