By Jack Bryar
Maybe NOW they'll get serious about fixing the security in their
This hasn't been a good couple of days for the executives at
Microsoft. The company fell victim to one of the oldest and dumbest
Web-hacks known. Someone at the company accidentally picked up a copy
QAZ Trojan, a virus, not much different from dozens of other Trojan
horse and worm programs, that have messed up Windows-based corporate
networks over the last couple of years courtesy of well-documented
in Windows, Office and Microsoft Outlook.
QAZ Trojan has been around for a while. It is usually picked up as
email attachment, and executes on opening. The user thinks they have
attached Windows Notepad message. QAZ executes a backdoor program,
effectively provides a third party with remote access to the user's
system -- and all the remote systems it has access to. Presumably this
back door allowed the hacker access to server files. Not long
afterwards, passwords were being sent to an email address in St.
Sometime thereafter Microsoft "security" personnel noticed that that
someone or something was touring the network and had stopped to peek at
some source code files -- at least that was the official story as of
Friday afternoon. The story kept changing throughout the course of the
day. At one point Microsoft's whole happy-talk SWAT team had sprung
action. Guys like Mark Murray, Rick Miller, John Pinette, and Matt
kept issuing ever-narrowing assurances that nothing happened that would
endanger Office or Windows, at least. There was no problem, nothing
really happened, nothing was touched (as far as they could tell) and
FBI was deeply involved.
Others suggested the problem was a little worse than that. The
Associated Press said that the breach might have begun a good five
ago, in mid-September. In addition, spokesmen for a security firm,
Communications, sent out a press release late Friday that claimed that
Word source programs were accessed. I spent much of Friday
evening with the company's press agency and never did discover how they
In the meantime, senior Microsoft executives around the world were
being chased down by reporters eager to find out what really happened.
The guy who got Steve Ballmer to admit that hackers had looked at
code had to track him down in a Swedish hallway.
Unfortunately, even when reporters managed to corner Microsoft
managers or other "experts" they asked all the wrong questions.
Reporters asked whether the hackers had somehow "compromised" the
company's software by taking a peek at files of source code. Of
Ballmer and all the others solemnly maintained that nothing had been
compromised. Such a silly question. Source code, particularly beta or
alpha level stuff, is going to be of little use to anyone except
Microsoft, unless the hackers also got most of the accompanying
documentation and related libraries. Such code certainly isn't going
be "held hostage," as the Wall Street Journal suggested, or be
"auctioned off to criminal elements."
Another guy, a reporter from the BBC, asked if perhaps some
competitor was trying "to get an edge" on the company -- a question
which would presume that Microsoft HAD competition.
In Russia, a very silly person named Denis Zenkin who
works for a "Moscow based anti-virus company" called Kaspersky Labs
local reporters that he knew the hackers weren't Russian despite the
Petersburg email address. How did he know this? He said it was because
the "only known hacker in St. Petersburg quit a few years ago."
That's a pretty funny claim. Crackers and phreakers have so
thoroughly compromised segments of Russia's telecom and data nets that
travelers are frequently warned that even a simple ATM or credit card
transaction can be a risky adventure. According to Alice Lagnado of
Times of London, crackers in the area are so organized that they have
their own magazine, which she called Khakers. I don't know Khakers,
I do know Hackers Magazine. Its editor, a fellow by the name of Sergei
Pokrovsky, told the Moscow Times how much admired the Microsoft
saying, "I want to meet them... They are real professionals."
Another nitwit, a self-proclaimed American "security expert,
from NASA" intoned gravely to a European reporter that this was
that Microsoft might be letting too many people test their code.
your own response here).
But by far the dumbest set of questions I heard anyone ask was
whether, somehow, this crack into a Microsoft code library meant that
Microsoft's software might now be vulnerable to penetration by
Over the last couple of years, pointing out security holes in
and Windows has grown into a virtual cottage industry. I get regular
emails from three web-based services that make money advising their
clients about new holes found in Microsoft's suite of products.
experts from around the globe make a good living by offering training
programs that point out these same security problems. Consulting
companies like Ernst & Young offer regular "Hacking 101" classes
focused largely on Microsoft, and they have three applicants for every
And there is a good reason for all this demand. According to the
Computer Security Institute, 273 large companies and government
reported losses totaling over $266 million last year, largely due to
software security problems.
In the past, concerns about Microsoft's security flaws have been met
with an avalanche of press releases and cosmetic patches that always
address the immediate problem, but which never addressed the
architectural issues that lay at the heart of many of these security
failures. Up to now, Microsoft has suggested that Windows, Outlook and
Office were certainly easier to secure than that Open Source
stuff. The company implied that the problem was largely the fault
users, and that poor administrative or user practices were at fault, or
that people simply didn't understand the software well enough to use it
All those things may be partly true. They may even be true at
Microsoft. But perhaps, now that these security problems have affected
the gnomes of Redmond, the company might try a little harder to fix
them. Even if you don't run a single Microsoft program, I think you'll
agree -- that development would be good for everyone.
NewsForge editors read and respond to comments posted on our