Microsoft Said to Have Responded Quietly to Hack of Secret Bug Tracking Database

Advertisement
By Reuters | Updated: 17 October 2017 12:58 IST
Highlights
  • Microsoft's bug detection software was hacked into around 4 years ago
  • Microsoft has not disclosed the extent of the breach after it was found
  • The database contained unfixed and critical vulnerabilities

Microsoft Corp's secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.

The company did not disclose the extent of the attack to the public or its customers after its discovery in 2013, but the five former employees described it to Reuters in separate interviews. Microsoft declined to discuss the incident.

The database contained descriptions of critical and unfixed vulnerabilities in some of the most widely used software in the world, including the Windows operating system. Spies for governments around the globe and other hackers covet such information because it shows them how to create tools for electronic break-ins.

Advertisement

The Microsoft flaws were fixed likely within months of the hack, according to the former employees. Yet speaking out for the first time, these former employees as well as US officials informed of the breach by Reuters said it alarmed them because the hackers could have used the data at the time to mount attacks elsewhere, spreading their reach into government and corporate networks.

Advertisement

"Bad guys with inside access to that information would literally have a 'skeleton key' for hundreds of millions of computers around the world," said Eric Rosenbach, who was US deputy assistant secretary of defense for cyber at the time.

Companies of all stripes now are ramping up efforts to find and fix bugs in their software amid a wave of damaging hacking attacks. Many firms, including Microsoft, pay security researchers and hackers "bounties" for information about flaws – increasing the flow of bug data and rendering efforts to secure the material more urgent than ever.

Advertisement

In an email responding to questions from Reuters, Microsoft said: "Our security teams actively monitor cyber threats to help us prioritise and take appropriate action to keep customers protected."

Sometime after learning of the attack, Microsoft went back and looked at breaches of other organizations around then, the five ex-employees said. It found no evidence that the stolen information had been used in those breaches.

Advertisement

Two current employees said the company stands by that assessment. Three of the former employees assert the study had too little data to be conclusive.

Microsoft tightened up security after the breach, the former employees said, walling the database off from the corporate network and requiring two authentications for access.

The dangers posed by information on such software vulnerabilities became a matter of broad public debate this year, after a National Security Agency stockpile of hacking tools was stolen, published and then used in the destructive "WannaCry" attacks against UK hospitals and other facilities.

After WannaCry, Microsoft President Brad Smith compared the NSA's loss to the "the US military having some of its Tomahawk missiles stolen," and cited "the damage to civilians that comes from hoarding these vulnerabilities."

Only one breach of a big database from a software company has been disclosed. In 2015, the nonprofit Mozilla Foundation - which develops the Firefox web browser - said an attacker had gotten access to a database that included 10 severe and unpatched flaws. One of those flaws was then leveraged in an attack on Firefox users, Mozilla disclosed at the time.

In contrast to Microsoft's approach, Mozilla provided extensive details of the breach and urged its customers to take action.

Mozilla Chief Business and Legal Officer Denelle Dixon said the foundation told the public about what it knew in 2015 "not only inform and help protect our users, but also to help ourselves and other companies learn, and finally because openness and transparency are core to our mission."

The Microsoft matter should remind companies to treat accurate bug reports as the "keys to the kingdom," said Mark Weatherford, who was deputy undersecretary for cyber-security at the US Department of Homeland Security when Microsoft learned of the breach.

Like the Pentagon's Rosenbach, Weatherford said he had not known of the Microsoft attack. Weatherford noted that most companies have strict security procedures around intellectual property and other sensitive corporate information.

"Your bug repository should be equally important," he said.

Alarm spreads after internal probe
Microsoft discovered the database breach in early 2013 after a highly skilled hacking group broke into computers at a number of major tech companies, including Apple Inc, Facebook Inc, and Twitter Inc.

The group, variously called Morpho, Butterfly and Wild Neutron by security researchers elsewhere, exploited a flaw in the Java programming language to penetrate employees' Apple Macintosh computers and then move to company networks.

The group remains active as one of the most proficient and mysterious hacking groups known to be in operation, according to security researchers. Experts can't agree about whether it is backed by a national government, let alone which one.

More than a week after stories about the breaches first appeared in 2013, Microsoft published a brief statement that portrayed its own break-in as limited and made no reference to the bug database.

"As reported by Facebook and Apple, Microsoft can confirm that we also recently experienced a similar security intrusion," the company said on February 22, 2013.

"We found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations. We have no evidence of customer data being affected, and our investigation is ongoing."

Inside the company, alarm spread as officials realized the database for tracking patches had been compromised, according to the five former security employees. They said the database was poorly protected, with access possible via little more than a password.

Concerns that hackers were using stolen bugs to conduct new attacks prompted Microsoft to compare the timing of those breaches with when the flaws had entered the database and when they were patched, according to the five former employees.

These people said the study concluded that even though the bugs in the database were used in ensuing hacking attacks, the perpetrators could have gotten the information elsewhere.

That finding helped justify Microsoft's decision not to disclose the breach, the former employees said, and in many cases patches already had been released to its customers.

Three of the five former employees Reuters spoke with said the study could not rule out stolen bugs having been used in follow-on attacks.

"They absolutely discovered that bugs had been taken," said one. "Whether or not those bugs were in use, I don't think they did a very thorough job of discovering."

That's partly because Microsoft relied on automated reports from software crashes to tell when attacks started showing up. The problem with this approach, some security experts say, is that most sophisticated attacks do not cause crashes, and the most targeted machines - such as those with sensitive government information - are the least likely to allow automated reporting.

© Thomson Reuters 2017

 

For details of the latest launches and news from Samsung, Xiaomi, Realme, OnePlus, Oppo and other companies at the Mobile World Congress in Barcelona, visit our MWC 2025 hub.

Advertisement

Related Stories

Popular Mobile Brands
  1. iPhone 17e vs iPhone 17: Price in India, Features, Specifications Compared
  2. Nothing Phone 4a Pro Teaser Hints at the Presence of This Phone 3 Feature
  3. Here's When the Xiaomi 17T Could Make Its Way to India
  4. MacBook Neo Launched in India With 13-Inch Display, A18 Pro Chip: See Price
  5. Vivo X300 FE Launched as Global Version of This Chinese Smartphone
  6. MediaTek Showcases Emergency Satellite Alerts With Starlink, AI Glasses
  7. Apple MacBook 'Neo' Listed on Regulatory Website Before Imminent Launch
  8. Samsung Galaxy A37, Galaxy A57 Get Better Geekbench Scores Ahead of Debut
  9. Moto Watch Review: The Best Smartwatch Under Rs. 6,000 in 2026?
  10. OnePlus 15T Confirmed to Launch With a Larger Battery, Faster Charging
  1. Realme Narzo Power 5G With 10,001mAh Battery Launched in India: Price, Specifications
  2. OnePlus 15T Teasers Confirm Larger Battery, Faster Charging Speed and Higher IP Rating
  3. Nothing Phone 4a Pro Teaser Suggests Presence of Phone 3's Glyph Matrix Panel
  4. Xiaomi 17T India Launch Timeline Leaked as Firm Gears Up for Xiaomi 17 Ultra's Debut in India
  5. Oppo Find X9 Series to Support Cross-Platform File Sharing With AirDrop via Quick Share
  6. Xiaomi to Reportedly Refresh In-House Smartphone Chips Annually; Eyes Global Expansion of AI Assistant
  7. Hubble Constant Puzzle Deepens as Supernova and CMB Measurements Clash
  8. MacBook Neo Launched in India With 13-Inch Liquid Retina Display, Apple's A18 Pro Chip: Price, Specifications
  9. Samsung Galaxy A37, Galaxy A57 Spotted on Geekbench With Better Results; Price, Design Leaked
  10. Vivo X300 FE Launched With Snapdragon 8 Gen 5, 50-Megapixel Telephoto Camera: Price, Features
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.