Feeds

MS blocks staff dial-in access after ‘minor’ hack

If you're safe now, why cut off 39,000 employees for the weekend?

  • alert
  • submit to reddit

The essential guide to IT transformation

According to Microsoft it knew about the hacker's intrusion almost immediately, it tracked the hacker's movements through its network, and it shut down all of the accounts used by the hacker last week. So how come it blocked access to its corporate network for all of its employees, globally, over the weekend?

Since Friday the company has been mounting a determined effort to convince the world that its systems, its software and its source code are secure, and if you take the story according to Microsoft at face value, the threat from the hacker was minor, was finite, and has now passed. A "Microsoft official" quoted in today's Wall Street Journal even went as far as suggesting that the company has detailed information that will help pinch the perpetrator.

So if it's all over bar the arresting, the only reasons for shutting down access must surely be that Microsoft has belatedly concluded that there are - as we suggested yesterday - serious problems with the way it runs its network security. In this context Microsoft's explanation of why it originally said the hacker could have been loose for six weeks, rather than the 12 days it now claims, is significant.

The six week period takes us back to when the corporate email system was taken down because of a virus outbreak, and Microsoft's security team initially feared - so it said - that the two might have been connected. But the real connection is their awareness of the fact that the methods of propagation for both were the same. If Microsoft staff and Microsoft systems are vulnerable to viral email attachments, then they must also be vulnerable to QAZ Trojans intended to break into the network. And besides, under current circumstances there's a high probability of copycat attacks.

Microsoft is clearly beginning a long, hard look at its network security, and Register sources suggest this is not before time. Said one: "MS source control is not very locked down. Pretty much every MS employee can commit to the tree. Which means if you're hacked in and you know this, you can commit your own backdoor code into Windows that might stand a chance of going gold."

This doesn't sound entirely plausible, although the large teams Microsoft has working on code would tend to make it more difficult to police security, and possible easier for rogue code to get through. A tale from Microsoft Germany, however, sounds all too convincing:

"Where I work, I have a colleague who has worked at MS Germany. He once mentioned that he had set up himself a dial-up server with callback in one of the labs there. This server remained active more than a year after he left. To quote: 'Need a new Office - no problem just keep leeching a weekend or so - it's callback, so it's for free.' Of course it was against security-policy (' ...and of course I had turned-off all logging').

"The server was only removed presumably during a full restructuring of the lab, where it was probably found to be superfluous and shut down..."

All companies are of course like this, but as Microsoft is probably the biggest, fattest, most tempting target for hackers, it really can't afford to be like this for much longer. ®

Related Stories:
MS hacked! Russian mafia swipes WinME source?
Redmond strives to cram Great MS Hack back in box

Secure remote control for conventional and virtual desktops

More from The Register

next story
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
China: You, Microsoft. Office-Windows 'compatibility'. You have 20 days to explain
Told to cough up more details as antitrust probe goes deeper
Windows 7 settles as Windows XP use finally starts to slip … a bit
And at the back of the field, Windows 8.1 is sprinting away from Windows 8
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?