Recent AD News

Hackers responsible for the SolarWinds hack also have their hands on Azure and Exchange source code

In an update released this Thursday, Microsoft disclosed that the hackers responsible for the SolarWinds attack have also stolen some source code related to Azure, Exchange, and Intune components. However, the tech giant added that their investigation did not point to any evidence of abuse targeted at their internal systems and its customers.

Microsoft took notice of this compromise back on December 31,2020, when they discovered evidence of unusual activity. They quickly uncovered that one of their accounts was used to view source code in some source code repositories. However since the account had restricted access to modify the source code, major ramifications have been prevented.

In the light of the SolarWinds breach, Microsoft has urged enterprises to adopt a zero-trust mentality – to bestow only the absolute necessary privilege and enforce multi-factor authentication.

Related posts
Recent AD NewsRecent PostsTop Read Articles

Google patches Chrome zero-day CVE-2025-10585 — active V8 exploit; update now

Active Directory FundamentalsActive Directory PoliciesRecent AD NewsTop Read Articles

DNS delegation architectures for multi-forest environments

Recent AD NewsRecent PostsTop Read Articles

FIDO Downgrade Attack Hits Microsoft Entra ID

Hand-picked ResourcesRecent AD NewsRecent Posts

Storm-0501 Exploits Microsoft Entra ID to Wipe and Ransom Azure Data

Leave a Reply

Your email address will not be published. Required fields are marked *

×

There are over 8,500 people who are getting towards perfection in Active Directory, IT Management & Cyber security through our insights from Identitude.

Wanna be a part of our bimonthly curation of IAM knowledge?

  • -Select-
  • By clicking 'Become an insider', you agree to processing of personal data according to the Privacy Policy.