Australia markets open in 6 hours 10 minutes
  • ALL ORDS

    7,299.10
    +43.30 (+0.60%)
     
  • AUD/USD

    0.7800
    +0.0028 (+0.36%)
     
  • ASX 200

    7,066.00
    +42.40 (+0.60%)
     
  • OIL

    65.30
    -0.97 (-1.46%)
     
  • GOLD

    1,868.40
    +0.80 (+0.04%)
     
  • BTC-AUD

    55,831.78
    +346.35 (+0.62%)
     
  • CMC Crypto 200

    1,220.37
    -32.77 (-2.62%)
     

Codecov hackers breached hundreds of restricted customer sites - sources

  • Oops!
    Something went wrong.
    Please try again later.
Joseph Menn and Raphael Satter
·3-min read
  • Oops!
    Something went wrong.
    Please try again later.

By Joseph Menn and Raphael Satter

SAN FRANCISCO, April 19 (Reuters) - Hackers who tampered with a software development tool from a company called Codecov used that program to gain restricted access to hundreds of networks belonging to the San Francisco firm's customers, investigators told Reuters.

Codecov makes software auditing tools that allow developers to see how thoroughly their own code is being tested, a process that can give the tool access to stored credentials for various internal software accounts.

The attackers used automation to rapidly copy those credentials and raid additional resources, the investigators said, expanding the breach beyond the initial disclosure by Codecov on Thursday.

The hackers put extra effort into using Codecov to get inside other makers of software development programs, as well as companies that themselves provide many customers with technology services, including IBM, one of the investigators said on condition of anonymity.

The person said both methods would allow the hackers to potentially gain credentials for thousands of other restricted systems.

IBM and other companies said that their code had not been altered, but did not address whether access credentials to their systems had been taken.

"We are investigating the reported Codecov incident and have thus far found no modifications of code involving clients or IBM," an IBM spokeswoman said.

The FBI's San Francisco office is investigating the compromises, and dozens of likely victims were notified on Monday. Private security companies were already beginning to respond to assist multiple clients, employees said.

Codecov did not respond to Reuters' request for comment on Monday.

Security experts involved in the case said the scale of the attack and the skills needed compared to last year's SolarWinds attack. The compromise of that company's widely used network management program led hackers inside nine U.S. government agencies and about 100 private companies.

It is unclear who is behind the latest breach or if they are working for a national government, as was the case with SolarWinds.

Others among Codecov's 19,000 customers, including big tech services provider Hewlett Packard Enterprise, said they were still trying to determine if they or their customers had been hurt.

"HPE has a dedicated team of professionals investigating this matter, and customers should rest assured we will keep them informed of any impacts and necessary remedies as soon as we know more," said HPE spokesman Adam Bauer.

Even Codecov users who had seen no evidence of hacking were taking the breach seriously, a corporate cybersecurity official told Reuters. He said his company was busy resetting its credentials and that his counterparts elsewhere were doing the same, as Codecov recommended.

Codecov earlier said hackers began tampering with its software on Jan. 31. It was only detected earlier this month when a customer raised concerns.

Codecov's website says its customers include consumer goods conglomerate Procter & Gamble Co, web hosting firm GoDaddy Inc, The Washington Post, and Australian software firm Atlassian Corporation PLC. Atlassian said it had not yet seen any impact nor signs of a compromise.

The Department of Homeland Security's cybersecurity arm and the FBI declined to comment. (Reporting by Joseph Menn, Raphael Satter and Christopher Bing; Editing by Sam Holmes)