Top Searches
- Gadgets Now
- News
- Tech News
- SolarWinds hacking campaign puts Microsoft in hot seat
SolarWinds hacking campaign puts Microsoft in hot seat
FacebookTwitterLinkedin
SolarWinds hacking campaign puts Microsoft in hot seat
PTI / Updated: Apr 17, 2021, 06:49PM IST
FacebookTwitterLinkedin
This has put the world's third-most valuable company in the hot seat. Because its products are a de facto monoculture in government and industry - with more than 85 per cent market share - federal lawmakers are insisting that Microsoft swiftly upgrade security to what they say it should have provided in the first place, and without fleecing taxpayers.
Seeking to assuage concerns, Microsoft this past week offered all federal agencies a year of "advanced" security features at no extra charge. But it also seeks to deflect blame, saying it is customers who do not always make security a priority.
Risks in Microsoft's foreign dealings also came into relief when the Biden administration imposed sanctions Thursday on a half-dozen Russian IT companies it said support Kremlin hacking.
Most prominent was Positive Technologies, which was among more than 80 companies that Microsoft has supplied with early access to data on vulnerabilities detected in its products.
Following the sanctions announcement, Microsoft said Positive Tech was no longer in the program and removed its name from a list of participants on its website.
The SolarWinds hackers took full advantage of what George Kurtz, CEO of top cybersecurity firm CrowdStrike, called "systematic weaknesses" in key elements of Microsoft code to mine at least nine US government agencies - the departments of Justice and Treasury, among them - and more than 100 private companies and think tanks, including software and telecommunications providers.
The SolarWinds hackers' abuse of Microsoft's identity and access architecture - which validates users' identities and grants them access to email, documents and other data - did the most dramatic harm, the nonpartisan Atlantic Council think tank said in a report. That set the hack apart as "a widespread intelligence coup."
In nearly every case of post-intrusion mischief, the intruders "silently moved through Microsoft products "vacuuming up emails and files from dozens of organizations."
Thanks in part to the carte blanche that victim networks granted the infected Solarwinds network management software in the form of administrative privileges, the intruders could move laterally across them, even jump among organizations. They used it to sneak into the cybersecurity firm Malwarebytes and to target customers of Mimecast, an email security company.
The campaign's "hallmark" was the intruders' ability to impersonate legitimate users and create counterfeit credentials that let them grab data stored remotely by Microsoft Office, the acting director of the Cybersecurity Infrastructure and Security Agency, Brandon Wales, told a mid-March congressional hearing.
"It was all because they compromised those systems that manage trust and identity on networks," he said.
Microsoft President Brad Smith told a February congressional hearing that just 15% of victims were compromised through an authentication vulnerability first identified in 2017 - allowing the intruders to impersonate authorized users by minting the rough equivalent of counterfeit passports.
Microsoft officials stress that the SolarWinds update was not always the entry point; intruders sometimes took advantage of vulnerabilities such as weak passwords and victims' lack of multi-factor authentication. But critics say the company took security too lightly. Sen. Ron Wyden, D-Ore., verbally pummeled Microsoft for not supplying federal agencies with a level of "event logging" that, if it had not detected the SolarWinds hacking in progress, would at least have provided responders with a record of where the intruders were and what they saw and removed.
"Microsoft chooses the default settings in the software it sells, and even though the company knew for years about the hacking technique used against US government agencies, the company did not set default logging settings to capture information necessary to spot hacks in progress," Wyden said. He was not the only federal lawmaker who complained.
When Microsoft on Wednesday announced a year of free security logging for federal agencies, for which it normally charges a premium, Wyden was not appeased.
"This move is far short of what's needed to make up for Microsoft's recent failures," he said in a statement.
"The government still won't have access to important security features without handing over even more money to the same company that created this cybersecurity sinkhole."
Rep. Jim Langevin, D-R.I., had pressed Smith in February on the security logging upsell, comparing it to making seat belts and air bags options in cars when they should be standard. He commended Microsoft for the one-year reprieve, but said a longer-term conversation is due about it "not being a profit center."
He said "this buys us a year."
Even the highest level of logging doesn't prevent break-ins, though. It only makes it easier to detect them.
And remember, many security professionals note, Microsoft was itself compromised by the SolarWinds intruders, who got access to some of its source code - its crown jewels. Microsoft's full suite of security products - and some of the industry's most skilled cyber-defense practitioners - had failed to detect the ghost in the network. It was alerted to its own breach by FireEye, the cybersecurity firm that first detected the hacking campaign in mid-December.(AP) RUP RUP
Follow Gadgets Now on Facebook and Twitter. For the latest news, tech news, breaking news headlines and live updates checkout Gadgetsnow.com
FacebookTwitterLinkedin
end of article