SolarWinds attackers downloaded source code from Microsoft's Azure, Intune, and Exchange
While the SolarWinds attackers managed to download portions of the source code of three Microsoft services, they did not gain access to customer data.
What you need to know
- The SolarWinds hackers were able to obtain a portion of source code from three Microsoft services.
- Small subsets of source code from Azure, Intune, and Exchange were downloaded by the attackers.
- Microsoft concluded that the attackers were not able to obtain customer data.
Microsoft recently completed its internal investigation of the SolarWinds attack. The investigation concluded that the people behind the attack did not gain access to customer data. The hackers did, however, manage to download a portion of the source code for Microsoft's Azure, Intune, and Exchange services.
Microsoft states in a blog post:
We have now completed our internal investigation into the activity of the actor and want to share our findings, which confirm that we found no evidence of access to production services or customer data. The investigation also found no indications that our systems at Microsoft were used to attack others. Because of our defense-in-depth protections, the actor was also not able to gain access to privileged credentials or leverage the SAML techniques against our corporate domains.
Microsoft also details that the attacks were able to download part of the source code of three of its products:
- A small subset of Azure components (subsets of service, security, identity)
- A small subset of Intune components
- A small subset of Exchange components
The attackers were likely seeking to find secrets based on the search terms that they used. Microsoft explains that it does not keep secrets in its code and that it uses automated tools to verify compliance with its rules related to this.
Microsoft President Brad Smith recently said that the SolarWinds attack was probably the "largest and most sophisticated attack the world has ever seen." The attacks targeted government agencies, NVIDIA, Intel, Cisco, Belkin, and other organizations.
The US government believes that Russia was behind the attack, though that's not confirmed at this point.
All the latest news, reviews, and guides for Windows and Xbox diehards.

Sean Endicott is a news writer and apps editor for Windows Central with 11+ years of experience. A Nottingham Trent journalism graduate, Sean has covered the industry’s arc from the Lumia era to the launch of Windows 11 and generative AI. Having started at Thrifter, he uses his expertise in price tracking to help readers find genuine hardware value.
Beyond tech news, Sean is a UK sports media pioneer. In 2017, he became one of the first to stream via smartphone and is an expert in AP Capture systems. A tech-forward coach, he was named 2024 BAFA Youth Coach of the Year. He is focused on using technology—from AI to Clipchamp—to gain a practical edge.
