Cloud Security

Microsoft’s Security Chickens Have Come Home to Roost

News analysis: SecurityWeek editor-at-large Ryan Naraine reads the CSRB report on China’s audacious Microsoft’s Exchange Online hack and isn’t at all surprised by the findings.

The US government’s public documentation of Microsoft’s shoddy cybersecurity practices, lax corporate culture and untruthfulness in public communications should come as no surprise to anyone. 

There were dark patterns everywhere. For years, we collectively groaned and rolled our eyes as Microsoft shipped faulty and incomplete patches, gutted its Patch Tuesday bulletins into irrelevance, fought with hackers reporting security problems, and made baffling trade-offs around cybersecurity transparency.

Even the ‘/security’ page, for years used as a place to simplify the distribution of security warnings, mitigation guidance and software patches, morphed into a landing page to hawk Microsoft’s newly “AI-powered” cybersecurity products.

On the flip side, every communication out of Microsoft is meant to project cybersecurity power, with constant reminders that cybersecurity is big business in Redmond, generating $20 billion a year today while it builds a so-called “AI-based cyber shield” to protect the world.  

This “dangerous addition to security revenue,” as Alex Stamos just described it, gets even uglier when Microsoft’s own security problems are used to upsell customers and important mitigation technologies are only available in expensive licensing packages.

In its review of the Microsoft Exchange Online hack, the government’s Cyber Safety Review Board (CSRB) called out “a cascade of Microsoft’s avoidable errors that allowed this intrusion to succeed” and warned that a second nation state-backed hacking team (Russia) have also been rummaging through highly-sensitive Microsoft corporate email accounts, source code repositories, and internal systems. 

“The Board finds that this intrusion was preventable and should never have occurred,” the CSRB said, bluntly.  “Microsoft’s security culture was inadequate and requires an overhaul, particularly in light of the company’s centrality in the technology ecosystem and the level of trust customers place in the company to protect their data and operations.” 

The CSRB, which styles itself as an independent investigative agency similar to the NTSB, said it found “a series of Microsoft operational and strategic decisions that collectively point to a corporate culture that deprioritized both enterprise security investments and rigorous risk management.”

Advertisement. Scroll to continue reading.

It goes further, pointing the finger directly at CEO Satya Nadella and calling on Redmond’s leadership to “directly focus” on the company’s security culture and to develop and share publicly a plan with specific timelines to make fundamental, security-focused reforms across the company and its full suite of products.  

Microsoft has already pre-empted the CSRB’s findings with the announcement of a Secure Future Initiative promising faster cloud patches, better management of identity signing keys and products with a higher default security bar but the CSRB wants Nadella to direct internal Microsoft teams to deprioritize feature developments across its cloud infrastructure and product suite until security risks are fully addressed.

While unsurprising, the CSRB findings should scare us all. Microsoft is too big to fail, with its OS and cloud technologies powering some of the most critical and essential services on earth. It’s not quite a monoculture from the Dan Geer era but it’s near impossible to avoid interacting with Microsoft’s ecosystems, whether it’s Azure, M365, LinkedIn or XBox today.

As the report notes, Microsoft and cloud service providers (CSPs) are custodians of nearly unimaginable amounts of data, from consumer personal information to communications of U.S. diplomats and other senior government officials, as well as commercial trade secrets and intellectual property.

Important businesses large and small have made the bet to become “Microsoft shops,” adding to supply chain risks while large parts of the anti-malware world are dependent on Defender detections and discoveries from the company’s (very strong!) threat intelligence research teams.

For those deeply entrenched in Microsoft’s world, security costs can add up significantly, especially for granular logging to help with security incident detection, investigation, and response. “This course of business should stop,” the CSRB notes, arguing that security-related logging should be a core element of cloud offerings.  

The CSRB report is a remarkable document providing a blow-by-blow into one of the most daring APT attacks in history against a company that somehow blew a decade’s worth of goodwill and completely lost its way in security.

Very few should be surprised.

Related: US Gov Rips Microsoft for Shoddy Security, Poor Response to Chinese Hack

Related: After Major Cloud Hacks, Microsoft Unveils ‘Secure Future Initiative’

Related: Microsoft Cloud Hack Exposed More Than Exchange, Outlook Emails

Related: Microsoft Hires New CISO in Major Security Shakeup

Related: Chinese Cyperspies Use Stolen Microsoft Key to Hack Gov Emails

Related Content

Malware & Threats

Patch Tuesday: Microsoft documents 60 security flaws in multiple software products and flags an actively exploited Windows zero-day for urgent attention.

CISO Strategy

Microsoft security chief Charlie Bell pledges significant reforms and a strategic shift to prioritize security above all other product features.

Artificial Intelligence

Microsoft provides an easy and logical first step into GenAI for many organizations, but beware of the pitfalls.

Nation-State

Cisco warns that nation state-backed hackers are exploiting at least two zero-day vulnerabilities in its ASA firewall platforms to plant malware on telecommunications and...

Malware & Threats

Russia-linked APT28 deploys the GooseEgg post-exploitation tool against numerous US and European organizations.

Data Breaches

The US government says Midnight Blizzard’s compromise of Microsoft corporate email accounts "presents a grave and unacceptable risk to federal agencies."

Cloud Security

Patch Tuesday: Microsoft warns that unauthenticated hackers can take complete control of Azure Kubernetes clusters.

Government

Australia and New Zealand support the UK in condemning Chinese hackers for targeting UK institutions and parliamentarians.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version