Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Microsoft Security

Microsoft Investigating Claims of Hacked Source Code Repositories (bleepingcomputer.com) 26

Microsoft says they are investigating claims that the Lapsus$ data extortion hacking group breached their internal Azure DevOps source code repositories and stolen data. BleepingComputer reports: Unlike many extortion groups we read about today, Lapsus$ does not deploy ransomware on their victim's devices. Instead, they target the source code repositories for large companies, steal their proprietary data, and then attempt to ransom that data back to the company for millions of dollars. While it is not known if the extortion group has successfully ransomed stolen data, Lapsus has gained notoriety over the past months for their confirmed attacks against NVIDIA, Samsung, Vodafone, Ubisoft, and Mercado Libre. Unfortunately, Lapsus$ has a good track record, with their claims of attacks on other companies later confirmed to be true.

While the leaking of source code makes it easier to find vulnerabilities in a company's software, Microsoft has previously stated that leaked source code does not create an elevation of risk. Microsoft says that their threat model assumes that threat actors already understand how their software works, whether through reverse engineering or previous source code leaks. "At Microsoft, we have an inner source approach -- the use of open source software development best practices and an open source-like culture -- to making source code viewable within Microsoft. This means we do not rely on the secrecy of source code for the security of products, and our threat models assume that attackers have knowledge of source code," explained Microsoft in a blog post about the SolarWinds attackers gaining access to their source code. "So viewing source code isn't tied to elevation of risk." However, source code repositories also commonly contain access tokens, credentials, API keys, and even code signing certificates.

This discussion has been archived. No new comments can be posted.

Microsoft Investigating Claims of Hacked Source Code Repositories

Comments Filter:
  • Microsoft assumes the source code is already leaked. They also assume that their users are criminals but that's another matter.
  • by bloodhawk ( 813939 ) on Monday March 21, 2022 @06:41PM (#62378549)

    However, source code repositories also commonly contain access tokens, credentials, API keys, and even code signing certificates.

    only for incompetent developers.

    • It's bad practice, yes. But it still happens. Just like some developers create and maintain systems that persist plaintext password credentials.
      • yes it happens, but anyone that does it is without a doubt incompetent. most enterprises don't just have policies against it, they use tools to check it isn't happening.
    • by gweihir ( 88907 )

      However, source code repositories also commonly contain access tokens, credentials, API keys, and even code signing certificates.

      only for incompetent developers.

      Indeed. But MS has tons of these, obviously. They have a reputation to maintain after all.

      From my experience in regulated industries, code repositories get scanned for hard-coded passwords, API keys and secret certificates. And if one is found, your repo gets locked away and you have real problems getting access again and need to prove you fixed things. I doubt MS does anything like that.

  • And MS knows their code is crap.

  • However, source code repositories also commonly contain access tokens, credentials, API keys, and even code signing certificates.

    They'd better bloody well not contain that kind of stuff. You don't check sensitive information like that into version control, it should be external to the source code and supplied as configuration so you can change it in the event of a compromise without having to rebuild and redeploy the application. C'mon, that's developer security 101 stuff.

    • by gweihir ( 88907 )

      C'mon, that's developer security 101 stuff.

      It is. But you know how many mandatory security classes many/most CS curriculums contain to this day? Zero. Not much better for people learning coding as a trade-skill.

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...