Application Security

10/17/2017
05:30 PM
50%
50%

Reuters: Microsoft's 2013 Breach Hit Bug Repository, Insiders Say

Five anonymous former Microsoft employees tell Reuters that Microsoft's database of internally discovered vulnerabilities was compromised in 2013, but Microsoft will not confirm it occurred.

In early 2013, Microsoft, Apple, Facebook, and Twitter all reported being compromised by the same threat group, via a Java exploit on Mac endpoints. Until today, however, there were no indications that the intrusion at Microsoft included a compromise of its vulnerability database. According to a Reuters exclusive, five anonymous former employees now say that this bug repository was indeed compromised.

If attackers did access a database that could have included yet-unpatched critical vulnerabilities, it could have enabled the attackers to launch more effective, dangerous campaigns against other targets. A 2015 Mozilla breach that exposed 10 unpatched vulnerabilities, for example, resulted in an attack on Firefox users; Mozilla subsequently disclosed the attack. 

However, Microsoft has not confirmed that the 2013 breach led to attacks on users of Microsoft products, nor have they confirmed the breach impacted the bug repository at all.   

Today, a Microsoft spokesperson told Dark Reading in an emailed statement:

“In February 2013, we commented on the discovery of malware, similar to that found by other companies at the time, on a small number of computers including some in our Mac business unit. Our investigation found no evidence of information being stolen and used in subsequent attacks.” 

In February 2013, in a Microsoft Technet blog, Matt Thomlinson, then general manager of Trusted Platform Security, wrote:

"As reported by Facebook and Apple, Microsoft can confirm that we also recently experienced a similar security intrusion. 

Consistent with our security response practices, we chose not to make a statement during the initial information gathering process. During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations. We have no evidence of customer data being affected and our investigation is ongoing."  

According to the Reuters report, the exposed bugs were patched within months and "Microsoft tightened up security after the breach, the former employees said, walling the [vulnerability] database off from the corporate network and requiring two authentications for access."

"It sounds like they responded to the breach in a reasonable fashion," says Chris Eng, vice president of research at application security company Veracode, "both in terms of prioritizing fixes and monitoring for real-world exploitation of the leaked vulnerability information." 

[Chris Eng will be speaking about "Security, Application Development, and DevOps" at Dark Reading's upcoming INsecurity conference, Nov. 29-30 at the Gaylord National Harbor in Maryland.]

Yet, according to the Reuters report, some former employees feel that the company relies too heavily on automated crash reports to determine whether or not vulnerabilities have been used in sophisticated attacks. 

Eng cautions against making comparisons between this event and the National Security Agency breach of exploit tools that led to the outbreak of WannaCry infections earlier this year.

"Comparing the theft of vulnerability reports to the theft of exploits (the NSA situation) is apples and oranges," says Eng. "Obtaining information on a given vulnerability is not the same as obtaining a reliable, working exploit. The attackers would have had to determine which of the bugs were actually security-related, then figure out which ones were exploitable, then develop exploits for them, each of which can take months."

Nevertheless, a database or bug tracking system "is as essential to protect as customer data,
 says Chris Goettl, product manager at asset and patch management firm Ivanti. "If a system holds information that can put your customers at risk. as in this case, it would be one you would want to focus additional security controls and limit access to."

"Disclosure of data from a bug tracking system is a high concern," says Goettl. "With access to a bug system where developers may have deconstructed an issue and even proposed resolutions an attacker would gain considerable insight into how to exploit those systems or applications. Even more concerning is the possibility that a bug could be resolved in currently supported products at the time, older versions could have the same flaws and not have been slated for resolution because they were no longer being supported."

For more information, see Reuters.  

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Vulnerabilities Dip 7%, but Researchers Are Cautious
Kelly Sheridan, Staff Editor, Dark Reading,  11/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Genius! Only a Big Brother can control another.
Current Issue
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19433
PUBLISHED: 2018-11-22
ShowDoc 2.4.1 has XSS via the lang parameter because install/database.php mishandles the $cur_lang value.
CVE-2018-19434
PUBLISHED: 2018-11-22
An issue was discovered on the "Bank Account Matching - Receipts" screen of the General Ledger component in webERP 4.15. BankMatching.php has Blind SQL injection via the AmtClear_ parameter.
CVE-2018-19435
PUBLISHED: 2018-11-22
An issue was discovered in the Sales component in webERP 4.15. SalesInquiry.php has SQL Injection via the SortBy parameter.
CVE-2018-19436
PUBLISHED: 2018-11-22
An issue was discovered in the Manufacturing component in webERP 4.15. CollectiveWorkOrderCost.php has Blind SQL Injection via the SearchParts parameter.
CVE-2018-19437
PUBLISHED: 2018-11-22
UCMS 1.4.7 allows remote authenticated users to change the administrator password because $_COOKIE['admin_'.cookiehash] is used for arbitrary cookie values that are set and not empty.