Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:50 PM
Connect Directly

Microsoft Confirms Its Network Was Breached With Tainted SolarWinds Updates

Attack on thousands of other companies as "moment of reckoning" for governments and industry, company president says.

Microsoft confirmed on Friday that its network was among the thousands infected with tainted software updates from SolarWinds, even as new data the company has released suggest the likely Russian actors behind the campaign were focused on a smaller set of targets than originally thought.

Microsoft on Friday said that it had detected malicious SolarWinds binaries in its environment, which the company isolated and removed. However, the software giant denied a Reuters report on Thursday that claimed Microsoft's own products were then used to distribute malware to other organizations in much the same way SolarWinds' Orion network product management technology was abused.

"We have not found evidence of access to production services or customer data," a Microsoft spokesman says. "Our investigations, which are ongoing, have found absolutely no indications that our systems were used to attack others." The spokesman says the sources for the Reuters report were likely misinformed or were misinterpreting their information.

Related Content:

5 Key Takeaways From the SolarWinds Breach

Building an Effective Cybersecurity Incident Response Team

New From The Edge: XDR 101: What's the Big Deal About Extended Detection & Response?

SolarWinds on Monday disclosed that attackers had infiltrated its software build system and inserted malicious code into software updates that the company subsequently sent out to 33,000 organizations worldwide — about 18,000 of whom actually installed it. The company has said that updates it released between March and June 2020 were tainted. 

However, Cisco Talos on Friday said its investigation shows the attack appears to have been initiated as far back as February. "Compromised binaries appear to have been available on the SolarWinds website until very recently," the company said.

Suspected victims include US Treasury Department, the Justice Department, the Energy Department, and the National Nuclear Security Administration. Security vendor FireEye and now Microsoft are two technology vendors that have confirmed they were breached via the tainted SolarWinds updates.

FireEye discovered the intrusion and has attributed it to UNC2452, an advanced persistent threat (APT) actor that the company says it has not encountered previously. According to the vendor, the threat actor hid a Trojan dubbed SUNBURST in a digitally signed component in SolarWinds' Orion network management product that was then sent out to thousands of SolarWinds customers worldwide. Security vendor Volexity, meanwhile, has said the tactics, techniques, and procedures involved in the SolarWinds attacks are similar to those used by another threat actor it is tracking as Dark Halo.

Microsoft president Brad Smith on Thursday said his company's analysis of the massive cyberattack shows the installation of SUNBURST gave the attackers an opportunity to exploit more than 17,000 organizations. However, the company's investigations so far show just 40 customers were "targeted more precisely and compromised through additional and sophisticated measures."

"Act of Recklessness"
About 80% of those compromised organizations are located in the United States, with the rest being scattered across seven additional countries: Canada, Mexico, Belgium, Spain, Israel, and the UAE. "It's certain that the number and location of victims will keep growing," Smith said in a company blog post. The initial list of victims includes organizations in the information technology sector, government, think tanks, and government contractors. 

Source: Microsoft
Source: Microsoft

Smith described the attack as a "moment of reckoning" for the government and industry. "The attack unfortunately represents a broad and successful espionage-based assault on both the confidential information of the US government and the tech tools used by firms to protect them," he said.

Though there has been no confirmed attribution yet, many security experts and government officials have noted the attacks as being the work of an APT group with ties to Russia's intelligence apparatus. Indeed, a map that Smith posted identifying Windows Defender's customers that had installed the tainted versions of SolarWinds' Orion software showed victims scattered across many countries, but not one in Russia.

"This is not 'espionage as usual,' even in the digital age," Smith warned. "Instead, it represents an act of recklessness that created a serious technological vulnerability for the United States and the world."

Source: Microsoft
Source: Microsoft

An analysis of the attack that security vendor Kaspersky released Friday also suggested that the threat actors behind the campaign may really have been after only a relatively small subset of the thousands of organizations they had breached.

Kaspersky said it had discovered the poisoned SolarWinds binaries on networks belonging to some 100 of the company's customers. In each case, the SUNBURST malware was designed to communicate information about the infected computer back to the attacker. Only if the attacker found the information interesting enough did they respond to the infected computer with a CNAME record pointing to a different second-level command and control server, the vendor said.

"At the moment, what the actors were interested in remains one of the biggest mysteries," says Costin Raiu, head of Kaspersky's global research and analysis team.

Available telemetry shows that the attackers are for sure interested in what appear to the high-profile government victims in various countries. They also appear to be interested in telecommunication companies, he says. "At the moment, we don't have enough data to fully comprehend the purpose of this operation and the goals, although more data becomes available every day, so the overall picture might improve as well."


Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This gives a new meaning to blind leading the blind.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-16
Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link vers...
PUBLISHED: 2021-06-16
Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. ...
PUBLISHED: 2021-06-16
tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-5...
PUBLISHED: 2021-06-16
Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using...
PUBLISHED: 2021-06-16
Nextcloud Talk is a fully on-premises audio/video and chat communication service. Password protected shared chats in Talk before version 9.0.10, 10.0.8 and 11.2.2 did not rotate the session cookie after a successful authentication event. It is recommended that the Nextcloud Talk App is upgraded to 9...