Microsoft hacked but downplays impact

A Microsoft spokesman said Friday afternoon that a hacker had managed to view -- but not alter -- source code to Microsoft software, but said the code was for a product under development that wasn't due to be released for "several years."

"The situation appears to be much narrower than we originally thought," said Microsoft spokesman Richard Miller. "We have no evidence that the hacker gained access to the source code to any of our products in release."

According to a Microsoft statement posted on the company's Web site, an investigation has produced "no evidence" that the intruder gained access to source code for any of the company's major products, including Windows Me, Windows 2000 or Office.

"We have no reason to believe that any of our customers are affected," the company asserted in the statement, in which it called the incident an act of "industrial espionage."

Miller said that investigators from the US Federal Bureau of Investigation were looking at the case, and that there have been no arrests, but could not comment further.

Microsoft discovered Wednesday that hackers had infiltrated computer systems at its Redmond headquarters, using a Trojan horse virus program embedded in an e-mail attachment. The intrusion was reported in Friday's Wall Street Journal.

The QAZ-Trojan will send information to an external e-mail address, and in Microsoft's case the address was in St. Petersburg, Russia and the information was passwords, a Microsoft spokeswoman who asked not to be named said earlier today. Microsoft contacted the FBI. on Thursday, she said.

Contrary to reports published earlier which suggested that Microsoft's networks may have first been breeched as long as three months ago, a source close to the investigation said this afternoon that the hackers had access to Microsoft's internal systems for six weeks or less.

"It's very rare that a company would reveal that it had been hacked this way ... it appears that it was serious," said Richard Stiennon, a security analyst for the market research firm Gartner Group. "We've seen that they have a good incident response team. Most corporations wouldn't know what the next step to take is."

"Even with all the security in place [at] Microsoft, and that Microsoft is the most attacked [company] in the world, this says that someone can still find and exploit weaknesses," Stiennon said.

Anna Johnson, director at Melbourne-based security consulting company Shake, says the "most amazing thing about the attack is that it could have been avoided."

"The QAZ Trojan has been around since July 2000," she said, "If Microsoft used up-to-date anti-virus filtering on their firewall and computer systems they would have been able to detect it."

The source code for Microsoft programs like the Windows operating system is under more-or-less constant modification by Microsoft's team as they look for errors and work on upgrades, said Russ Cooper, the moderator for an online forum for computer security, NTBugTraq.

Changes in source code would also have a ripple effect, he noted. "It's not like the copy of Windows you buy on a CD-ROM in the store," he said. "What if I make a change in Windows Me that will be shipped to consumers with a 'back door,' so I can break into their systems? The possibilities are endless. You can go off in 97 different directions."

Join the PC World newsletter!

Error: Please check your email address.

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?