Skip to main content

Microsoft testifies before Congress about the SolarWinds hack as rivals shift blame

by Eamon McCarthy Earls
Assistant Editor, MSDynamicsWorld.com

Microsoft president Brad Smith appeared on Tuesday along with executives from SolarWinds, FireEye, and CrowdStrike at US Senate hearings to provide new testimony on the hacking campaign that centered on SolarWinds and public cloud infrastructure.

In his opening statement, Smith praised FireEye for its openness and willingness to involve Microsoft in the attack investigation. He told lawmakers that the company has notified 60 customers, mostly in the US, that they were compromised and, in his words, "likely had data accessed in this campaign." And he added that Microsoft believes the impact of the hack reaches internationally:

In addition to this estimate, we have identified additional government and private sector victims in other countries, and we believe it is highly likely that there remain other victims not yet identified, perhaps especially in regions where governments and other organizations where cloud migration is not as far advanced as it is in the United States. In truth, no one yet knows for certain, except the Russian attacker.

FREE Membership Required to View Full Content:

Joining MSDynamicsWorld.com gives you free, unlimited access to news, analysis, white papers, case studies, product brochures, and more. You can also receive periodic email newsletters with the latest relevant articles and content updates.
Learn more about us here

About Eamon McCarthy Earls

As the assistant editor at MSDynamicsWorld.com, Eamon helps to oversee editorial content on the site and supports site management and strategy. He can be reached at eearls@msdynamicsworld.com.

Before joining MSDynamicsWorld.com, Eamon was editor for SearchNetworking.com at TechTarget, where he covered networking technology, IoT, and cybersecurity. He is also the author of multiple books and previously contributed to publications such as the Boston Globe, Milford Daily News, and DefenceWeb.