

A former employee says software giant dismissed his warnings about a critical flaw because it feared losing government business.

By Renee Dudley
Tech Reporter
ProPublica

By Doris Burke
Senior Research Reporter
ProPublica
Introduction
Microsoft hired Andrew Harris for his extraordinary skill in keeping hackers out of the nationโs most sensitive computer networks. In 2016, Harris was hard at work on a mystifying incident in which intruders had somehow penetrated a major U.S. tech company.
The breach troubled Harris for two reasons. First, it involved the companyโs cloud โ a virtual storehouse typically containing an organizationโs most sensitive data. Second, the attackers had pulled it off in a way that left little trace.
He retreated to his home office to โwar gameโ possible scenarios, stress-testing the various software products that could have been compromised.
Early on, he focused on a Microsoft application that ensured users had permission to log on to cloud-based programs, the cyber equivalent of an officer checking passports at a border. It was there, after months of research, that he found something seriously wrong.
The product, which was used by millions of people to log on to their work computers, contained a flaw that could allow attackers to masquerade as legitimate employees and rummage through victimsโ โcrown jewelsโ โ national security secrets, corporate intellectual property, embarrassing personal emails โ all without tripping alarms.
To Harris, who had previously spent nearly seven years working for the Defense Department, it was a security nightmare. Anyone using the software was exposed, regardless of whether they used Microsoft or another cloud provider such as Amazon. But Harris was most concerned about the federal government and the implications of his discovery for national security. He flagged the issue to his colleagues.
They saw it differently, Harris said. The federal government was preparing to make a massive investment in cloud computing, and Microsoft wanted the business. Acknowledging this security flaw could jeopardize the companyโs chances, Harris recalled one product leader telling him. The financial consequences were enormous. Not only could Microsoft lose a multibillion-dollar deal, but it could also lose the race to dominate the market for cloud computing.
Harris said he pleaded with the company for several years to address the flaw in the product, a ProPublica investigation has found. But at every turn, Microsoft dismissed his warnings, telling him they would work on a long-term alternative โ leaving cloud services around the globe vulnerable to attack in the meantime.
Harris was certain someone would figure out how to exploit the weakness. Heโd come up with a temporary solution, but it required customers to turn off one of Microsoftโs most convenient and popular features: the ability to access nearly every program used at work with a single logon.
He scrambled to alert some of the companyโs most sensitive customers about the threat and personally oversaw the fix for the New York Police Department. Frustrated by Microsoftโs inaction, he left the company in August 2020.

Within months, his fears became reality. U.S. officials confirmed reports that a state-sponsored team of Russian hackers had carried out SolarWinds, one of the largest cyberattacks in U.S. history. They used the flaw Harris had identified to vacuum up sensitive data from a number of federal agencies, including, ProPublica has learned, the National Nuclear Security Administration, which maintains the United Statesโ nuclear weapons stockpile, and the National Institutes of Health, which at the time was engaged in COVID-19 research and vaccine distribution. The Russians also used the weakness to compromise dozens of email accounts in the Treasury Department, including those of its highest-ranking officials. One federal official described the breach as โan espionage campaign designed for long-term intelligence collection.โ
Harrisโ account, told here for the first time and supported by interviews with former colleagues and associates as well as social media posts, upends the prevailing public understanding of the SolarWinds hack.
From the moment the hack surfaced, Microsoft insisted it was blameless. Microsoft President Brad Smith assured Congress in 2021 that โthere was no vulnerability in any Microsoft product or service that was exploitedโ in SolarWinds.
He also said customers could have done more to protect themselves.
Harris said they were never given the chance.
โThe decisions are not based on whatโs best for Microsoftโs customers but on whatโs best for Microsoft,โ said Harris, who now works for CrowdStrike, a cybersecurity company that competes with Microsoft.
Microsoft declined to make Smith and other top officials available for interviews for this story, but it did not dispute ProPublicaโs findings. Instead, the company issued a statement in response to written questions. โProtecting customers is always our highest priority,โ a spokesperson said. โOur security response team takes all security issues seriously and gives every case due diligence with a thorough manual assessment, as well as cross-confirming with engineering and security partners. Our assessment of this issue received multiple reviews and was aligned with the industry consensus.โ
ProPublicaโs investigation comes as the Pentagon seeks to expand its use of Microsoft products โ a move that has drawn scrutiny from federal lawmakers amid a series of cyberattacks on the government.
Smith is set to testify on Thursday before the House Homeland Security Committee, which is examining Microsoftโs role in a breach perpetrated last year by hackers connected to the Chinese government. Attackers exploited Microsoft security flaws to gain access to top U.S. officialsโ emails. In investigating the attack, the federal Cyber Safety Review Board found that Microsoftโs โsecurity culture was inadequate and requires an overhaul.โ

For its part, Microsoft has said that work has already begun, declaring that the companyโs top priority is security โabove all else.โ Part of the effort involves adopting the boardโs recommendations. โIf youโre faced with the tradeoff between security and another priority, your answer is clear: Do security,โ the companyโs CEO, Satya Nadella, told employees in the wake of the boardโs report, which identified a โcorporate culture that deprioritized both enterprise security investments and rigorous risk management.โ
ProPublicaโs investigation adds new details and pivotal context about that culture, offering an unsettling look into how the worldโs largest software provider handles the security of its own ubiquitous products. It also offers crucial insight into just how much the quest for profits can drive those security decisions, especially as tech behemoths push to dominate the newest โ and most lucrative โ frontiers, including the cloud market.
โThis is part of the problem overall with the industry,โ said Nick DiCola, who was one of Harrisโ bosses at Microsoft and now works at Zero Networks, a network security firm. Publicly-traded tech giants โare beholden to the share price, not to doing whatโs right for the customer all the time. Thatโs just a reality of capitalism. Youโre never going to change that in a public company because at the end of the day, they want the shareholder value to go up.โ
A “Cloud-First World”
Early this year, Microsoft surpassed Apple to become the worldโs most valuable company, worth more than $3 trillion. That triumph was almost unimaginable a decade ago. (The two remain in close competition for the top spot.)
In 2014, the same year that Harris joined Microsoft and Nadella became the CEO, Wall Street and consumers alike viewed the company as stuck in the past, clinging to the โshrink-wrappedโ software products like Windows that put it on the map in the 1990s. Microsoftโs long-stagnant share price reflected its status as an also-ran in almost every major technological breakthrough since the turn of the century, from its Bing search engine to its Nokia mobile phone division.
As the new CEO, Nadella was determined to reverse the trend and shake off the companyโs fuddy-duddy reputation, so he staked Microsoftโs future on the Azure cloud computing division, which then lagged far behind Amazon. In his earliest all-staff memo, Nadella told employees they would need โto reimagine a lot of what we have done in the past for a โฆ cloud-first world.โ

Microsoft salespeople pitched business and government customers on a โhybrid cloudโ strategy, where they kept some traditional, on-premises servers (typically stored on racks in customersโ own offices) while shifting most of their computing needs to the cloud (hosted on servers in Microsoft data centers).
Security was a key selling point for the cloud. On-site servers were notoriously vulnerable, in part because organizationsโ overburdened IT staff often failed to promptly install the required patches and updates. With the cloud, that crucial work was handled by dedicated employees whose job was security.
The dawn of the cloud era at Microsoft was an exciting time to work in the field of cybersecurity for someone like Harris, whose high school yearbook features a photo of him in front of a desktop computer and monitor with a mess of floppy disks beside him. One hand is on the keyboard, the other on a wired mouse. Caption: โHarris the hacker.โ

As a sophomore at Pace University in New York, he wrote a white paper titled โHow to Hack the Wired Equivalent Protocol,โ a network security standard, and was awarded a prestigious Defense Department scholarship, which the government uses to recruit cybersecurity specialists. The National Security Agency paid for three years of his tuition, which included a masterโs degree in software engineering, in exchange for a commitment to work for the government for at least that long, he said.
Early in his career, he helped lead the Defense Departmentโs efforts to protect individual devices. He became an expert in the niche field known as identity and access management, securing how people log in.
As the years wore on, he grew frustrated by the lumbering bureaucracy and craved the innovation of the tech industry. He decided he could make a bigger impact in the private sector, which designed much of the software the government used.
At Microsoft he was assigned to a secretive unit known as the โGhostbustersโ (as in: โWho you gonna call?โ), which responded to hacks of the companyโs most sensitive customers, especially the federal government. As a member of this team, Harris first investigated the puzzling attack on the tech company and remained obsessed with it, even after switching roles inside Microsoft.
Eventually, he confirmed the weakness within Active Directory Federation Services, or AD FS, a product that allowed users to sign on a single time to access nearly everything they needed. The problem, he discovered, rested in how the application used a computer language known as SAML to authenticate users as they logged in.

To understand how a SAML attack would unfold, let’s imagine a robber who wants to gain access to all of the apartment buildings owned by a landlord.

The robber finds an open window in a single apartment and climbs in, similar to how a hacker could use a phishing email to log on to a single user’s account.

Once inside, the robber roams the halls looking for the landlordโs office, where keys to all the buildingโs units are kept. Likewise, a hacker moves through an organizationโs on-premises servers. Their first target is Microsoftโs equivalent of the landlordโs office, a directory that stores information such as usernames and passwords.

The robber, however, wants to break into all the landlord’s buildings, just as a hacker wants to breach the cloud. The robber unlocks the office safe, which contains a master key. In a cyber break-in, the safe is AD FS, the weak link that Harris identified.

The robber makes a copy of the master key, which provides access to all of the landlord’s buildings and apartments. In a SAML attack, a hacker extracts the private key from the AD FS server and forges โtokensโ that allow the intruder to masquerade as a user with the highest levels of access.

Now the robber can access any apartment in any building with little trace. And because the landlord’s keys are still in the office, no one suspects anything is amiss. Likewise, in a SAML attack, the hacker goes unnoticed because their sign-in information looks legitimate.
This is what makes a SAML attack unique. Typically, hackers leave what cybersecurity specialists call a โnoisyโ digital trail. Network administrators monitoring the so-called โaudit logsโ might see unknown or foreign IP addresses attempting to gain access to their cloud services. But SAML attacks are much harder to detect. The forged token is the equivalent of a robber using a copied master key. There was little trail to track, just the activities of what appear to be legitimate users.
Harris and a colleague who consulted for the Department of Defense spent hours in front of both real and virtual whiteboards as they mapped out how such an attack would work, the colleague told ProPublica. The โtoken theftโ risk, as Harris referred to it, became a regular topic of discussion for them.
A Clash With โWonโt Fixโ Culture
Before long, Harris alerted his supervisors about his SAML finding. Nick DiCola, his boss at the time, told ProPublica he referred Harris to the Microsoft Security Response Center, which fields reports of security vulnerabilities and determines which need to be addressed. Given its central role in improving Microsoft product security, the team once considered itself the โconscience of the company,โ urging colleagues to improve security without regard to profit. In a meeting room, someone hung a framed photo of Winston โthe Wolf,โ the charismatic fixer in Quentin Tarantinoโs movie โPulp Fictionโ who is summoned to clean up the aftermath of bloody hits.
Members of the team were not always popular within the company. Plugging security holes is a cost center, and making new products is a profit center, former employees told ProPublica. In 2002, the companyโs founder, Bill Gates, tried to settle the issue, sending a memo that turned out to be eerily prescient. โFlaws in a single Microsoft product, service or policy not only affect the quality of our platform and services overall, but also our customersโ view of us as a company,โ Gates wrote, adding: โSo now, when we face a choice between adding features and resolving security issues, we need to choose security.โ
At first, Gatesโ memo was transformational and the companyโs product divisions were more responsive to the centerโs concerns. But over time, the centerโs influence waned.
Its members were stuck between cultural forces. Security researchers โ often characterized as having outsized egos โ believed their findings should be immediately addressed, underestimating the business challenges of developing fixes quickly, former MSRC employees told ProPublica.
Product managers had little motivation to act fast, if at all, since compensation was tied to the release of new, revenue-generating products and features. That attitude was particularly pronounced in Azure product groups, former MSRC members said, because they were under pressure from Nadella to catch up to Amazon.
โAzure was the Wild West, just this constant race for features and functionality,โ said Nate Warfield, who worked in the MSRC for four years beginning in 2016. โYou will get a promotion because you released the next new shiny thing in Azure. You are not going to get a promotion because you fixed a bunch of security bugs.โ
Former employees told ProPublica that the center fielded hundreds or even thousands of reports a month, pushing the perennially understaffed group to its limits. The magazine Popular Science noted that volume as one of the reasons why working in the MSRC was one of the 10 โworst jobs in science,โ between whale feces researchers and elephant vasectomists.
โTheyโre trained, because theyโre so resource constrained, to think of these cases in terms of: โHow can I get to โwonโt fix,โโ said Dustin Childs, who worked in the MSRC in the years leading up to Harrisโ saga. Staff would often punt on fixes by telling researchers they would be handled in โv-next,โ the next product version, he said. Those launches, however, could be years away, leaving customers vulnerable in the interim, he said.
The center also routinely rejected researchersโ reports of weaknesses by saying they didnโt cross what its staff called a โsecurity boundary.โ But when Harris discovered the SAML flaw, it was a term with no formal definition, former employees said.

By 2017, the lack of clarity had become the โbutt of jokes,โ Warfield said. Several prominent security researchers who regularly interacted with the MSRC made T-shirts and stickers that said โ____ [fill in the blank] is not a security boundary.โ
โAny time Microsoft didnโt want to fix something, theyโd just say, โThatโs not a security boundary, weโre not going to fix it,โโ Warfield recalled.
Unaware of the inauspicious climate, Harris met virtually with MSRC representatives and sketched out how a hacker could jump from an on-premises server to the cloud without being detected. The MSRC declined to address the problem. Its staff argued that hackers attempting to exploit the SAML flaw would first have to gain access to an on-premises server. As they saw it, Harris said, that was the security boundary โ not the subsequent hop to the cloud.
Business over Security
โWTF,โ Harris recalled thinking when he got the news. โThis makes no sense.โ
Microsoft had told customers the cloud was the safest place to put their most precious data. His discovery proved that, for the millions of users whose systems included AD FS, their cloud was only as secure as their on-premises servers. In other words, all the buildings owned by the landlord are only as secure as the most careless tenant who forgot to lock their window.
Harris pushed back, but he said the MSRC held firm.
Harris had a reputation for going outside the chain of command to air his concerns, and he took his case to the team managing the products that verified user identities.
He had some clout, his former colleagues said. He had already established himself as a known expert in the field, had pioneered a cybersecurity threat detection method and later was listed as the named inventor on a Microsoft patent. Harris said he โwent kind of crazyโ and fired off an email to product manager Mark Morowczynski and director Alex Simons requesting a meeting.
He understood that developing a long-term fix would take time, but he had an interim solution that could eliminate the threat. One of the main practical functions of AD FS was to allow users to access both on-premises servers and a variety of cloud-based services after entering credentials only once, a Microsoft feature known as โseamlessโ single sign-on. Harris proposed that Microsoft tell its customers to turn off that function so the SAML weakness would no longer matter.
According to Harris, Morowczynski quickly jumped on a videoconference and said he had discussed the concerns with Simons.
โEveryone violently agreed with me that this is a huge issue,โ Harris said. โEveryone violently disagreed with me that we should move quickly to fix it.โ
Morowczynski, Harris said, had two primary objections.
First, a public acknowledgement of the SAML flaw would alert adversaries who could then exploit it. Harris waved off the concern, believing it was a risk worth taking so that customers wouldnโt be ignorant to the threat. Plus, he believed Microsoft could warn customers without betraying any specifics that could be co-opted by hackers.
According to Harris, Morowczynskiโs second objection revolved around the business fallout for Microsoft. Harris said Morowczynski told him that his proposed fix could alienate one of Microsoftโs largest and most important customers: the federal government, which used AD FS. Disabling seamless SSO would have widespread and unique consequences for government employees, who relied on physical โsmart cardsโ to log onto their devices. Required by federal rules, the cards generated random passwords each time employees signed on. Due to the configuration of the underlying technology, though, removing seamless SSO would mean users could not access the cloud through their smart cards. To access services or data on the cloud, they would have to sign in a second time and would not be able to use the mandated smart cards.
Harris said Morowczynski rejected his idea, saying it wasnโt a viable option.
Morowczynski told Harris that his approach could also undermine the companyโs chances of getting one of the largest government computing contracts in U.S. history, which would be formally announced the next year. Internally, Nadella had made clear that Microsoft needed a piece of this multibillion-dollar deal with the Pentagon if it wanted to have a future in selling cloud services, Harris and other former employees said.
Killing the Competition
By Harrisโ account, the team was also concerned about the potential business impact on the products sold by Microsoft to sign into the cloud. At the time, Microsoft was in a fierce rivalry with a company called Okta.
Microsoft customers had been sold on seamless SSO, which was one of the competitive advantages โ or, in Microsoft parlance, โkill pointsโ โ that the company then had over Okta, whose users had to sign on twice, Harris said.
Harrisโ proposed fix would undermine the companyโs strategy to marginalize Okta and would โadd frictionโ to the user experience, whereas the โNo. 1 priority was to remove friction,โ Harris recalled Morowczynski telling him. Moreover, it would have cascading consequences for the cloud business because the sale of identity products often led to demand for other cloud services.
โThat little speed bump of you authenticating twice was unacceptable by Microsoftโs standards,โ Harris said. He recalled Morowczynski telling him that the product groupโs call โwas a business decision, not a technical one.โ
โWhat they were telling me was counterintuitive to everything Iโd heard at Microsoft about โcustomer first,โโ Harris said. โNow theyโre telling me itโs not โcustomer first,โ itโs actually โbusiness first.โโ
DiCola, Harrisโ then-supervisor, told ProPublica the race to dominate the market for new and high-growth areas like the cloud drove the decisions of Microsoftโs product teams. โThat is always like, โDo whatever it frickinโ takes to win because you have to win.โ Because if you donโt win, itโs much harder to win it back in the future. Customers tend to buy that product forever.โ
According to Harris, Morowczynski said his team had โon the road mapโ a product that could replace AD FS altogether. But it was unclear when it would be available to customers.
In the months that followed, Harris vented to his colleagues about the product groupโs decision. ProPublica talked to three people who worked with Harris at the time and recalled these conversations. All of them spoke on the condition of anonymity because they feared professional repercussions. The three said Harris was enraged and frustrated over what he described to them as the product groupโs unwillingness to address the weakness.
Neither Morowczynski nor Simons returned calls seeking comment, and Microsoft declined to make them available for interviews. The company did not dispute the details of Harrisโ account. In its statement, Microsoft said it weighs a number of factors when it evaluates potential threats. โWe prioritize our security response work by considering potential customer disruption, exploitability, and available mitigations,โ the spokesperson said. โWe continue to listen to the security research community and evolve our approach to ensure we are meeting customer expectations and protecting them from emerging threats.โ
Another Major Warning
Following the conversation with Morowczynski, Harris wrote a reminder to himself on the whiteboard in his home office: โSAML follow-up.โ He wanted to keep the pressure on the product team.
Soon after, the Massachusetts- and Tel Aviv-based cybersecurity firm CyberArk published a blog post describing the flaw, which it dubbed โGolden SAML,โ along with a proof of concept, essentially a road map that showed how hackers could exploit the weakness.
Years later, in his written testimony for the Senate Intelligence Committee, Microsoftโs Brad Smith said this was the moment the company learned of the issue. โThe Golden SAML theory became known to cybersecurity professionals at Microsoft and across the U.S. government and the tech sector at precisely the same time, when it was published in a public paper in 2017,โ Smith wrote.
Lavi Lazarovitz of CyberArk said the firm mentioned the weakness โ before the post was published โ in a private WhatsApp chat of about 10 security researchers from various companies, a forum members used to compare notes on emerging threats. When they raised the discovery to the group, which included at least one researcher from Microsoft, the other members were dismissive, Lazarovitz said.
โMany in the security research community โ I donโt want to say mocked โ but asked, โWell, whatโs the big deal?โโ Lazarovitz said.

Nevertheless, CyberArk believed it was worth taking seriously, given that AD FS represented the gateway to usersโ most sensitive information, including email. โThreat actors operate in between the cracks,โ Lazarovitz said. โSo obviously, we understood the feedback that we got, but we still believed that this technique will be eventually leveled by threat actors.โ
The Israel-based team also reached out to contacts at Microsoftโs Israeli headquarters and were met with a response similar to the one they got in the WhatsApp group, Lazarovitz said.
The published report was CyberArkโs way of warning the public about the threat. Disclosing the weakness also had a business benefit for the company. In the blog post, it pitched its own security product, which it said โwill be extremely beneficial in blocking attackers from getting their hands on important assets like the token-signing certificate in the first place.โ
The report initially received little attention. Harris, however, seized on it. He said he alerted Morowczynski and Simons from the product group as well as the MSRC. The situation was more urgent than before, Harris argued to them, because CyberArk included the proof of concept that could be used by hackers to carry out a real attack. For Harris, it harkened back to Morowczynskiโs worry that flagging the weakness could give hackers an advantage.
โI was more energetic than ever to have us actually finally figure out what weโre going to do about this,โ Harris said.
But the MSRC reiterated its โsecurity boundaryโ stance, while Morowczynski reaffirmed the product groupโs earlier decision, Harris said.
Harris said he then returned to his supervisors, including Hayden Hainsworth and Bharat Shah, who, as corporate vice president of the Azure cloud security division, also oversaw the MSRC. โI said, โCan you guys please listen to me,โโ Harris recalled. โโThis is probably the most important thing Iโve ever done in my career.โโ
Harris said they were unmoved and told him to take the problem back to the MSRC.
Microsoft did not publicly comment on the CyberArk blog post at the time. Years later, in written responses to Congress, Smith said the companyโs security researchers reviewed the information but decided to focus on other priorities. Neither Hainsworth nor Shah returned calls seeking comment.
Defusing a Ticking Bomb
Harris said he was deeply frustrated. On a personal level, his ego was bruised. Identifying major weaknesses is considered an achievement for cybersecurity professionals, and, despite his internal discovery, CyberArk had claimed Golden SAML.
More broadly, he said he was more worried than ever, believing the weakness was a ticking bomb. โItโs out in the open now,โ he said.
Publicly, Microsoft continued to promote the safety of its products, even boasting of its relationship with the federal government in sales pitches. โTo protect your organization, Azure embeds security, privacy, and compliance into its development methodology,โ the company said in late 2017, โand has been recognized as the most trusted cloud for U.S. government institutions.โ

Internally, Harris complained to colleagues that customers were being left vulnerable.
โHe was definitely having issuesโ with the product team, said Harrisโ former Microsoft colleague who consulted for the Defense Department. โHe vented that it was a problem that they just wanted to ignore.โ
Harris typically pivoted from venting to discussing how to protect customers, the former colleague said. โI asked him to show me what Iโm going to have to do to make sure the customers were aware and could take corrective action to mitigate the risk,โ he said.
Harris also took his message to LinkedIn, where he posted a discreet warning and an offer.
โI hope all my friends and followers on here realize by now the security relationshipโ involved in authenticating users in AD FS, he wrote in 2019. โIf not, reach out and letโs fix that!โ

Separately, he realized he could help customers with whom he had existing relationships, including the NYPD, the nationโs largest police force.
โKnowing this exploit is actually possible, why would I not architect around it, especially for my critical customers?โ Harris said.
On a visit to the NYPD, Harris told a top IT official, Matthew Fraser, about the AD FS weakness and recommended disabling seamless SSO. Fraser was in disbelief at the severity of the issue, Harris recalled, and he agreed to disable seamless SSO.
In an interview, Fraser confirmed the meeting.
โThis was identified as one of those areas that was prime, ripe,โ Fraser said of the SAML weakness. โFrom there, we figured out whatโs the best path to insulate and secure.โ
More Troubling Revelations
It was over beers at a conference in Orlando in 2018 that Harris learned the weakness was even worse than heโd initially realized. A colleague sketched out on a napkin how hackers could also bypass a common security feature called multifactor authentication, which requires users to perform one or more additional steps to verify their identity, such as entering a code sent via text message.
They realized that, no matter how many additional security steps a company puts in place, a hacker with a forged token can bypass them all. When they brought the new information to the MSRC, โit was a nonstarter,โ Harris said. While the center had published a formal definition of โsecurity boundaryโ by that point, Harrisโ issues still didnโt meet it.

By March 2019, concerns over Golden SAML were spilling out into the wider tech world. That month, at a conference in Germany, two researchers from the cybersecurity company Mandiant delivered a presentation demonstrating how hackers could infiltrate AD FS to gain access to organizationsโ cloud accounts and applications. They also released the tools they used to do so.
Mandiant said it notified Microsoft before the presentation, making it the second time in roughly 16 months that an outside firm had flagged the SAML issue to the company.
In August 2020, Harris left Microsoft to work for CrowdStrike. In his exit interview with Shah, Harris said he raised the SAML weakness one last time. Shah listened but offered no feedback, he said.
โThere is no inspector general-type thingโ within Microsoft, Harris said. โIf something egregious is happening, where the hell do you go? Thereโs no place to go.โ
SolarWinds Breaks
Four months later, news of the SolarWinds attack broke. Federal officials soon announced that beginning in 2019 Russian hackers had breached and exploited the network management software offered by a Texas-based company called SolarWinds, which had the misfortune of lending its name to the attack. The hackers covertly inserted malware into the firmโs software updates, gaining โbackdoorโ access to the networks of companies and government agencies that installed them. The ongoing access allowed hackers to take advantage of โpost-exploitโ vulnerabilities, including Golden SAML, to steal sensitive data and emails from the cloud.
Despite the name, nearly a third of victims of the attack never used SolarWinds software at all, Brandon Wales, then acting director of the federal Cybersecurity and Infrastructure Security Agency, said in the aftermath. In March 2021, Wales told a Senate panel that hackers were able to โgain broad access to data stores that they wanted, largely in Microsoft Office 365 Cloud โฆ and it was all because they compromised those systems that manage trust and identity on networks.โ
Microsoft itself was also breached.
In the immediate aftermath of the attack, Microsoft advised customers of Microsoft 365 to disable seamless SSO in AD FS and similar products โ the solution that Harris proposed three years earlier.
As the world dealt with the consequences, Harris took his long simmering frustration public in a series of posts on social media and on his personal blog. Challenging Brad Smith by name, and criticizing the MSRCโs decisions โ which he referred to as โutter BSโ โ Harris lambasted Microsoft for failing to publicly warn customers about Golden SAML.
Microsoft โwas not transparent about these risks, forced customers to use ADFS knowing these risks, and put many customers and especially US Govโt in a bad place,โ Harris wrote on LinkedIn in December 2020. A long-term fix was โnever a priorityโ for the company, he wrote. โCustomers are boned and sadly itโs been that way for years (which again, sickens me),โ Harris said in the post.
In the months and years following the SolarWinds attack, Microsoft took a number of actions to mitigate the SAML risk. One of them was a way to efficiently detect fallout from such a hack. The advancement, however, was available only as part of a paid add-on product known as Sentinel.
The lack of such a detection, the company said in a blog post, had been a โblind spot.โ
โMicrosoft Is Back on Topโ
In early 2021, the Senate Select Committee on Intelligence called Brad Smith to testify about SolarWinds.
Although Microsoftโs product had played a central role in the attack, Smith seemed unflappable, his easy and conversational tone a reflection of the relationships he had spent decades building on Capitol Hill. Without referencing notes or reading from a script, as some of his counterparts did, he confidently deflected questions about Microsoftโs role. Laying the responsibility with the government, he said that in the lead-up to the attack, the authentication flaw โwas not prioritized by the intelligence community as a risk, nor was it flagged by civilian agencies or other entities in the security community as a risk that should be elevatedโ over other cybersecurity priorities.
Smith also downplayed the significance of the Golden SAML weakness, saying it was used in just 15% of the 60 cases that Microsoft had identified by that point. At the same time, he acknowledged that, โwithout question, these are not the only victims who had data observed or taken.โ
When Sen. Marco Rubio of Florida pointedly asked him what Microsoft had done to address Golden SAML in the years before the attack, Smith responded by listing a handful of steps that customers could have taken to protect themselves. His suggestions included purchasing an antivirus product like Microsoft Defender and securing devices with another Microsoft product called Intune.
โThe reality is any organization that did all five of those things, if it was breached, it in all likelihood suffered almost no damage,โ Smith said.
Neither Rubio nor any other senator pressed further.
Ultimately, Microsoft won a piece of the Defense Departmentโs multibillion-dollar cloud business, sharing it with Amazon, Google and Oracle.
Since December 2020, when the SolarWinds attack was made public, Microsoftโs stock has soared 106%, largely on the runaway success of Azure and artificial intelligence products like ChatGPT, where the company is the largest investor. โMicrosoft Is Back on Top,โ proclaimed Fortune, which featured Nadella on the cover of its most recent issue.
In September 2021, just 10 months after the discovery of SolarWinds, the paperback edition of Smithโs book, โTools and Weapons,โ was published. In it, Smith praised Microsoftโs response to the attack. The MSRC, Smith wrote, โquickly activated its incident response planโ and the company at large โmobilized more than 500 employees to work full time on every aspect of the attack.โ
In the new edition, Smith also reflected on his congressional testimony on SolarWinds. The hearings, he wrote, โexamined not only what had happened but also what steps needed to be taken to prevent such attacks in the future.โ He didnโt mention it in the book, but that certainly would include the long-term alternative that Morowczynski first promised to Harris in 2017. The company began offering it in 2022.
Originally published by ProPublica, 06.13.2024, under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 United States license.


