SolarWinds Hackers Accessed Microsoft Source Code, the Company Says

The Microsoft logo is pictured ahead of the Mobile World Congress in Barcelona, Spain February 24, 2019. (Reuters)
The Microsoft logo is pictured ahead of the Mobile World Congress in Barcelona, Spain February 24, 2019. (Reuters)
TT

SolarWinds Hackers Accessed Microsoft Source Code, the Company Says

The Microsoft logo is pictured ahead of the Mobile World Congress in Barcelona, Spain February 24, 2019. (Reuters)
The Microsoft logo is pictured ahead of the Mobile World Congress in Barcelona, Spain February 24, 2019. (Reuters)

The hacking group behind the SolarWinds compromise was able to break into Microsoft Corp and access some of its source code, Microsoft said on Thursday, something experts said sent a worrying signal about the spies’ ambition.

Source code - the underlying set of instructions that run a piece of software or operating system - is typically among a technology company’s most closely guarded secrets and Microsoft has historically been particularly careful about protecting it.

It is not clear how much or what parts of Microsoft’s source code repositories the hackers were able to access, but the disclosure suggests that the hackers who used software company SolarWinds as a springboard to break into sensitive US government networks also had an interest in discovering the inner workings of Microsoft products as well.

Microsoft had already disclosed that like other firms it found malicious versions of SolarWinds’ software inside its network, but the source code disclosure - made in a blog post - is new. After Reuters reported it was breached two weeks ago, Microsoft said it had not “found any evidence of access to production services.”

Three people briefed on the matter said Microsoft had known for days that the source code had been accessed. A Microsoft spokesman said security employees had been working “around the clock” and that “when there is actionable information to share, they have published and shared it.”

The SolarWinds hack is among the most ambitious cyber operations ever disclosed, compromising at least half-a-dozen federal agencies and potentially thousands of companies and other institutions. US and private sector investigators have spent the holidays combing through logs to try to understand whether their data has been stolen or modified.

Modifying source code - which Microsoft said the hackers did not do - could have potentially disastrous consequences given the ubiquity of Microsoft products, which include the Office productivity suite and the Windows operating system. But experts said that even just being able to review the code could offer hackers insight that might help them subvert Microsoft products or services.

“The source code is the architectural blueprint of how the software is built,” said Andrew Fife of Israel-based Cycode, a source code protection company.

“If you have the blueprint, it’s far easier to engineer attacks.”

Matt Tait, an independent cybersecurity researcher, agreed that the source code could be used as a roadmap to help hack Microsoft products, but he also cautioned that elements of the company’s source code were already widely shared - for example with foreign governments. He said he doubted that Microsoft had made the common mistake of leaving cryptographic keys or passwords in the code.

“It’s not going to affect the security of their customers, at least not substantially,” Tait said.

Microsoft noted that it allows broad internal access to its code, and former employees agreed that it is more open than other companies.

In its blog post, Microsoft said it had found no evidence of access “to production services or customer data.”

“The investigation, which is ongoing, has also found no indications that our systems were used to attack others,” it said.

Reuters reported a week ago that Microsoft-authorized resellers were hacked and their access to productivity programs inside targets leveraged in attempts to read email. Microsoft acknowledged some vendor access was misused but has not said how many resellers or customers may have been breached.

There was no response to requests for comment from the FBI, which is investigating the hacking campaign, or from the Department of Homeland Security’s Cybsersecurity and Infrastructure Security Agency.

US officials have attributed the SolarWinds hacking campaign to Russia, an allegation the Kremlin denies.

Both Tait and Ronen Slavin, Cycode’s chief technology officer, said a key unanswered question was which source code repositories were accessed. Microsoft has a huge range of products, from widely used Windows to lesser known software such as social networking app Yammer and the design app Sway.

Slavin said he was worried by the possibility that the SolarWinds hackers were poring over Microsoft’s source code as prelude to a much more ambitious offensive.

“To me the biggest question is, ‘Was this recon for the next big operation?’” he said.



Amazon Says Blocked 1,800 North Koreans from Applying for Jobs

Amazon logo (Reuters)
Amazon logo (Reuters)
TT

Amazon Says Blocked 1,800 North Koreans from Applying for Jobs

Amazon logo (Reuters)
Amazon logo (Reuters)

US tech giant Amazon said it has blocked over 1,800 North Koreans from joining the company, as Pyongyang sends large numbers of IT workers overseas to earn and launder funds.

In a post on LinkedIn, Amazon's Chief Security Officer Stephen Schmidt said last week that North Korean workers had been "attempting to secure remote IT jobs with companies worldwide, particularly in the US".

He said the firm had seen nearly a one-third rise in applications by North Koreans in the past year, reported AFP.

The North Koreans typically use "laptop farms" -- a computer in the United States operated remotely from outside the country, he said.

He warned the problem wasn't specific to Amazon and "is likely happening at scale across the industry".

Tell-tale signs of North Korean workers, Schmidt said, included wrongly formatted phone numbers and dodgy academic credentials.

In July, a woman in Arizona was sentenced to more than eight years in prison for running a laptop farm helping North Korean IT workers secure remote jobs at more than 300 US companies.

The scheme generated more than $17 million in revenue for her and North Korea, officials said.

Last year, Seoul's intelligence agency warned that North Korean operatives had used LinkedIn to pose as recruiters and approach South Koreans working at defense firms to obtain information on their technologies.

"North Korea is actively training cyber personnel and infiltrating key locations worldwide," Hong Min, an analyst at the Korea Institute for National Unification, told AFP.

"Given Amazon's business nature, the motive seems largely economic, with a high likelihood that the operation was planned to steal financial assets," he added.

North Korea's cyber-warfare program dates back to at least the mid-1990s.

It has since grown into a 6,000-strong cyber unit known as Bureau 121, which operates from several countries, according to a 2020 US military report.

In November, Washington announced sanctions on eight individuals accused of being "state-sponsored hackers", whose illicit operations were conducted "to fund the regime's nuclear weapons program" by stealing and laundering money.

The US Department of the Treasury has accused North Korea-affiliated cybercriminals of stealing over $3 billion over the past three years, primarily in cryptocurrency.


KAUST Scientists Develop AI-Generated Data to Improve Environmental Disaster Tracking

King Abdullah University of Science and Technology (KAUST) logo
King Abdullah University of Science and Technology (KAUST) logo
TT

KAUST Scientists Develop AI-Generated Data to Improve Environmental Disaster Tracking

King Abdullah University of Science and Technology (KAUST) logo
King Abdullah University of Science and Technology (KAUST) logo

King Abdullah University of Science and Technology (KAUST) and SARsatX, a Saudi company specializing in Earth observation technologies, have developed computer-generated data to train deep learning models to predict oil spills.

According to KAUST, validating the use of synthetic data is crucial for monitoring environmental disasters, as early detection and rapid response can significantly reduce the risks of environmental damage.

Dean of the Biological and Environmental Science and Engineering Division at KAUST Dr. Matthew McCabe noted that one of the biggest challenges in environmental applications of artificial intelligence is the shortage of high-quality training data.

He explained that this challenge can be addressed by using deep learning to generate synthetic data from a very small sample of real data and then training predictive AI models on it.

This approach can significantly enhance efforts to protect the marine environment by enabling faster and more reliable monitoring of oil spills while reducing the logistical and environmental challenges associated with data collection.


Uber, Lyft to Test Baidu Robotaxis in UK from Next Year 

A sign of Baidu is pictured at the company's headquarters in Beijing, China March 16, 2023. (Reuters)
A sign of Baidu is pictured at the company's headquarters in Beijing, China March 16, 2023. (Reuters)
TT

Uber, Lyft to Test Baidu Robotaxis in UK from Next Year 

A sign of Baidu is pictured at the company's headquarters in Beijing, China March 16, 2023. (Reuters)
A sign of Baidu is pictured at the company's headquarters in Beijing, China March 16, 2023. (Reuters)

Uber Technologies and Lyft are teaming up with Chinese tech giant Baidu to try out driverless taxis in the UK next year, marking a major step in the global race to commercialize robotaxis.

It highlights how ride-hailing platforms are accelerating autonomous rollout through partnerships, positioning London as an early proving ground for large-scale robotaxi services ‌in Europe.

Lyft, meanwhile, plans ‌to deploy Baidu's ‌autonomous ⁠vehicles in Germany ‌and the UK under its platform, pending regulatory approval. Both companies have abandoned in-house development of autonomous vehicles and now rely on alliances to accelerate adoption.

The partnerships underscore how global robotaxi rollouts are gaining momentum. ⁠Alphabet's Waymo said in October it would start ‌tests in London this ‍month, while Baidu ‍and WeRide have launched operations in the ‍Middle East and Switzerland.

Robotaxis promise safer, greener and more cost-efficient rides, but profitability remains uncertain. Public companies like Pony.ai and WeRide are still loss-making, and analysts warn the economics of expensive fleets could pressure margins ⁠for platforms such as Uber and Lyft.

Analysts have said hybrid networks, mixing robotaxis with human drivers, may be the most viable model to manage demand peaks and pricing.

Lyft completed its $200 million acquisition of European taxi app FreeNow from BMW and Mercedes-Benz in July, marking its first major expansion beyond North America and ‌giving the US ride-hailing firm access to nine countries across Europe.