Application Security

10/17/2017
05:30 PM
50%
50%

Reuters: Microsoft's 2013 Breach Hit Bug Repository, Insiders Say

Five anonymous former Microsoft employees tell Reuters that Microsoft's database of internally discovered vulnerabilities was compromised in 2013, but Microsoft will not confirm it occurred.

In early 2013, Microsoft, Apple, Facebook, and Twitter all reported being compromised by the same threat group, via a Java exploit on Mac endpoints. Until today, however, there were no indications that the intrusion at Microsoft included a compromise of its vulnerability database. According to a Reuters exclusive, five anonymous former employees now say that this bug repository was indeed compromised.

If attackers did access a database that could have included yet-unpatched critical vulnerabilities, it could have enabled the attackers to launch more effective, dangerous campaigns against other targets. A 2015 Mozilla breach that exposed 10 unpatched vulnerabilities, for example, resulted in an attack on Firefox users; Mozilla subsequently disclosed the attack. 

However, Microsoft has not confirmed that the 2013 breach led to attacks on users of Microsoft products, nor have they confirmed the breach impacted the bug repository at all.   

Today, a Microsoft spokesperson told Dark Reading in an emailed statement:

“In February 2013, we commented on the discovery of malware, similar to that found by other companies at the time, on a small number of computers including some in our Mac business unit. Our investigation found no evidence of information being stolen and used in subsequent attacks.” 

In February 2013, in a Microsoft Technet blog, Matt Thomlinson, then general manager of Trusted Platform Security, wrote:

"As reported by Facebook and Apple, Microsoft can confirm that we also recently experienced a similar security intrusion. 

Consistent with our security response practices, we chose not to make a statement during the initial information gathering process. During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations. We have no evidence of customer data being affected and our investigation is ongoing."  

According to the Reuters report, the exposed bugs were patched within months and "Microsoft tightened up security after the breach, the former employees said, walling the [vulnerability] database off from the corporate network and requiring two authentications for access."

"It sounds like they responded to the breach in a reasonable fashion," says Chris Eng, vice president of research at application security company Veracode, "both in terms of prioritizing fixes and monitoring for real-world exploitation of the leaked vulnerability information." 

[Chris Eng will be speaking about "Security, Application Development, and DevOps" at Dark Reading's upcoming INsecurity conference, Nov. 29-30 at the Gaylord National Harbor in Maryland.]

Yet, according to the Reuters report, some former employees feel that the company relies too heavily on automated crash reports to determine whether or not vulnerabilities have been used in sophisticated attacks. 

Eng cautions against making comparisons between this event and the National Security Agency breach of exploit tools that led to the outbreak of WannaCry infections earlier this year.

"Comparing the theft of vulnerability reports to the theft of exploits (the NSA situation) is apples and oranges," says Eng. "Obtaining information on a given vulnerability is not the same as obtaining a reliable, working exploit. The attackers would have had to determine which of the bugs were actually security-related, then figure out which ones were exploitable, then develop exploits for them, each of which can take months."

Nevertheless, a database or bug tracking system "is as essential to protect as customer data,
 says Chris Goettl, product manager at asset and patch management firm Ivanti. "If a system holds information that can put your customers at risk. as in this case, it would be one you would want to focus additional security controls and limit access to."

"Disclosure of data from a bug tracking system is a high concern," says Goettl. "With access to a bug system where developers may have deconstructed an issue and even proposed resolutions an attacker would gain considerable insight into how to exploit those systems or applications. Even more concerning is the possibility that a bug could be resolved in currently supported products at the time, older versions could have the same flaws and not have been slated for resolution because they were no longer being supported."

For more information, see Reuters.  

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.