Microsoft has been investing and launching several methods to protect devices from the Solorigate attack over the past few weeks. The company had, among other things, prepared Microsoft 365 Defender to manage the infected and vulnerable devices better.
Microsoft source code compromised?
However, in the latest news, Microsoft has said that the Solorigate attackers may have had access to some of Microsoft’s source code. The company is also keen to add that this does not indicate an escalation of threat. Instead, the tech giant wanted to update the claim that it could only find malicious SolarWinds code.
To do this, the attackers must have hacked some systems in the Microsoft network. However, according to the spokesperson, those attacks did not have permission to make changes to the official source code. This is why Microsoft has concluded that there is no escalation of threat.
It is also worth noting that the team behind the SolarWinds attack could not access any sensitive information from the tech giant. It means users don’t have to worry about their private data being compromised. The official posts also added that Microsoft systems were not used to extend the attacks either.
This latest announcement from Microsoft indicates a few more things about the SolarWinds attack. First of all, the attack was premeditated, and that it cannot be categorized under the normal attack the tech world sees every day. Secondly, the magnitude of Solorigate is more extensive than ever.
The fact that tech and digital security pioneers like Microsoft took weeks to understand that the attackers had access to its systems means that the threat actors had done an exceptional job of covering their tracks. These will also mean that we would see an ever-increasing number of Solorigate-infected systems in the future.
In light of these recent developments, enterprise firms using the infected suite must look a little deeper into what has happened in their systems. Considering that the attack has entered the Microsoft system’s most secure walls, the attackers would have easily surpassed the less secure system used across the world.
More companies are preparing their security tools and end-point solutions to manage the Solorigate attack on the bright side.
- Tags: Cyberattack