Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Microsoft Hacked: Joins Apple, Facebook, Twitter

Microsoft's OS X users compromised by watering-hole attack launched from a third-party iOS development site.

Add Microsoft to the list of leading technology companies that have recently seen their employees' computers get hacked after they visited a third-party website devoted to iOS development.

According to a Friday "Recent Cyberattacks" blog post from Matt Thomlinson, general manager for trustworthy computing security at Microsoft, the company "recently experienced a similar security intrusion" to the attacks that penetrated the networks of Apple and Facebook.

"Consistent with our security response practices, we chose not to make a statement during the initial information gathering process," said Thomlinson. "During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations. We have no evidence of customer data being affected and our investigation is ongoing."

[ Worried about the Chinese, Russians, hacktivists or cybercrime gangs infiltrating your network? Don't Blame China For Security Hacks, Blame Yourself. ]

Thomlinson's short statement squares with what's already known about the attacks, based on previously issued public comments from Apple, Facebook and Twitter. Namely, in what's called a watering-hole attack, whoever launched these attacks first compromised the popular iPhoneDevSDK website, without tipping off the website's administrator, and then used the site to launch drive-by attacks against anyone who visited. The attacks, which targeted a zero-day vulnerability in the Java browser plug-in that's since been patched by Oracle, were obviously quite effective, because they affected OS X systems at Apple, Facebook, Microsoft and Twitter.

Microsoft's public statement also suggests that many more than just those four businesses may have been successfully compromised by attackers.

What were attackers seeking? One likely answer is that they were simply trawling for any customer data or proprietary company information that would have resale value on the black market, for example to better customize phishing attacks.

But Sean Sullivan, security advisor at F-Secure Labs, has also warned that the attackers may have had their eye on adding backdoor code -- that executes after a time delay -- into mobile iOS apps under development. "Apple and Google's app stores don't review source code, [they] just run the apps," said Sullivan via email. So, thinking like an attacker: "I would inject code that only enables itself in certain circumstances and at certain times (and build a botnet that way)," he said.

Accordingly, Sullivan recommends that all security managers review their employees' website-visiting logs to see if anyone visited iPhoneDevSDK, as well as review their mobile application code bases to look for unauthorized changes. In addition, any businesses -- and especially smaller organizations -- that thought they weren't a target should put a security plan to place to mitigate future zero-day attacks that target their developers. "They should be more proactive (paranoid) in the first place," Sullivan said. "Small startups probably mix work and play. They shouldn't. Buy your developers an additional laptop for just work."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
2/26/2013 | 6:35:25 AM
re: Microsoft Hacked: Joins Apple, Facebook, Twitter
The hack was targeted at OSX. Twitter, Facebook, and obviously Apple are all OSX shops. There's only one department where you're likely to find OSX at Microsoft though, and here we are.

Note: since the actual 0day was in Java, most likely they could have included a Windows malware if they wanted, but it's a good bet that the majority of visitors to an iPhone dev site are running OSX.
PJS880
50%
50%
PJS880,
User Rank: Ninja
2/25/2013 | 9:42:00 PM
re: Microsoft Hacked: Joins Apple, Facebook, Twitter
I am beginning to see a trend here among all of these corporations. I think that the decision by Thomlinson to not announce the breach immediately was a mistake that will bite him. If Microsoft is weary and sketchy about the actual breach itself what is to keep them form keeping exactly what was compromised form you also?

Paul Sprague
InformationWeek Contributor
Why AI Will Create Far More Jobs Than It Replaces
John DiLullo, CEO, Lastline,  5/14/2019
Baltimore Ransomware Attack Takes Strange Twist
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/14/2019
Windows 10 Migration: Getting It Right
Kevin Alexandra, Principal Solutions Engineer at BeyondTrust,  5/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11809
PUBLISHED: 2019-05-20
An issue was discovered in Joomla! before 3.9.6. The debug views of com_users do not properly escape user supplied data, which leads to a potential XSS attack vector.
CVE-2019-12198
PUBLISHED: 2019-05-20
In GoHttp through 2017-07-25, there is a stack-based buffer over-read via a long User-Agent header.
CVE-2019-12185
PUBLISHED: 2019-05-20
eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web r...
CVE-2019-12184
PUBLISHED: 2019-05-19
There is XSS in browser/components/MarkdownPreview.js in BoostIO Boostnote 0.11.15 via a label named flowchart, sequence, gallery, or chart, as demonstrated by a crafted SRC attribute of an IFRAME element, a different vulnerability than CVE-2019-12136.
CVE-2019-12173
PUBLISHED: 2019-05-18
MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.