SEATTLE — Microsoft Corp. said Sunday that a hacker had high-level access to its computer system for 12 days — not up to five weeks, as the company had first reported — and that the company monitored the illegal activity the entire time.
While the company says no major corporate secrets were stolen, at least one security expert said 12 days would be plenty of time for a hacker to do damage that may not have been detected yet.
Microsoft spokesman Rick Miller said Sunday that beginning Oct. 14 a hacker gained access to high-level secrets and was able to view blueprints, or source code, for Microsoft software being developed.
Originally, the Seattle-based software giant said an electronic intruder had access to source code for as long as five weeks. On Friday, when the company first confirmed the it, the duration was unclear, Miller said.
The company was alerted to the break-in by the creation of new accounts that give users access to parts of Microsoft's computer network.
"We start seeing these new accounts being created, but that could be an anomaly of the system," Miller said. "After a day or two, we realized it was someone hacking into the system."
On Oct. 26, that the company notified federal law enforcement, which is investigating. Miller said the company is confident the high-level access occurred only between Oct. 14 and Oct. 25.
"We realized the intrusion had grown to the level that warranted bringing in the FBI," Miller said. Miller said the activity did not corrupt or modify the code for the product, however the hacker could have accessed corporate e-mails and other confidential information.
Recommended for you
If any attempts to download or transfer the source code were made, such activity was not recorded in Microsoft's logs, Miller said. He said it was unlikely source code files were copied because of their immense size.
But at least one security expert questioned Miller's assessment.
"It's impossible to say with absolute certainty that (source code) file has not been copied," according to Simon Perry, vice president of security solutions at Computer Associates International in Islandia, N.Y. "Over a 12 day period, it would be absolutely possible to take a copy of that."
Microsoft has refused to identify what program the source code was for, except to say it was a product years from release — not Windows or Office software.
Microsoft's source codes are the most coveted in the multibillion-dollar industry. With access to the software blueprints, competitors could write programs that undermine Microsoft — or use the data to identify vulnerabilities, making computer break-ins and virus-writing easier.
For instance, the 'Love Bug' virus that crippled computers around the globe in May exploited a security glitch in Microsoft's market-leading e-mail programs.
The hackers in this particular case used what is called a "Trojan horse," a program commonly sent as an e-mail attachment that looks normal but once inadvertently activated by the user can wreak havoc on a computer system.
Keep the discussion civilized. Absolutely NO
personal attacks or insults directed toward writers, nor others who
make comments. Keep it clean. Please avoid obscene, vulgar, lewd,
racist or sexually-oriented language. Don't threaten. Threats of harming another
person will not be tolerated. Be truthful. Don't knowingly lie about anyone
or anything. Be proactive. Use the 'Report' link on
each comment to let us know of abusive posts. PLEASE TURN OFF YOUR CAPS LOCK. Anyone violating these rules will be issued a
warning. After the warning, comment privileges can be
revoked.
Please purchase a Premium Subscription to continue reading.
To continue, please log in, or sign up for a new account.
We offer one free story view per month. If you register for an account, you will get two additional story views. After those three total views, we ask that you support us with a subscription.
A subscription to our digital content is so much more than just access to our valuable content. It means you’re helping to support a local community institution that has, from its very start, supported the betterment of our society. Thank you very much!
(0) comments
Welcome to the discussion.
Log In
Keep the discussion civilized. Absolutely NO personal attacks or insults directed toward writers, nor others who make comments.
Keep it clean. Please avoid obscene, vulgar, lewd, racist or sexually-oriented language.
Don't threaten. Threats of harming another person will not be tolerated.
Be truthful. Don't knowingly lie about anyone or anything.
Be proactive. Use the 'Report' link on each comment to let us know of abusive posts.
PLEASE TURN OFF YOUR CAPS LOCK.
Anyone violating these rules will be issued a warning. After the warning, comment privileges can be revoked.