SAN FRANCISCO: Microsoft Corp. said on Thursday it found malicious software in its systems related to a massive hacking campaign disclosed by US officials this week, adding a top technology target to a growing list of attacked government agencies.
The Redmond, Washington company is a user of Orion, the widely deployed networking management software from SolarWinds Corp, which was used in the suspected Russian attacks on vital US agencies and others.
Microsoft also had its own products leveraged to attack victims, said people familiar with the matter.
“Like other SolarWinds customers, we have been actively looking for indicators of this actor and can confirm that we detected malicious Solar Winds binaries in our environment, which we isolated and removed,” a Microsoft spokesperson said, adding that the company had found “no indications that our systems were used to attack others.”
One of the people familiar with the hacking spree said the hackers made use of Microsoft cloud offerings while avoiding Microsoft’s corporate infrastructure.
Microsoft did not immediately respond to questions about the technique.
Still, another person familiar with the matter said the Department of Homeland Security (DHS) does not believe Microsoft was a key avenue of fresh infection.
Both Microsoft and the DHS, which earlier on Thursday said the hackers used multiple methods of entry, are continuing to investigate.
The FBI and other agencies have scheduled a classified briefing for members of Congress Friday.
The US Energy Department also said it has evidence hackers gained access to its networks as part of the campaign. Politico had earlier reported the National Nuclear Security Administration (NNSA), which manages the country’s nuclear weapons stockpile, was targeted.
An Energy Department spokeswoman said malware “has been isolated to business networks only” and has not impacted US national security, including the NNSA.
The DHS said in a bulletin on Thursday the hackers had used other techniques besides corrupting updates of network management software by SolarWinds which is used by hundreds of thousands of companies and government agencies.
CISA urged investigators not to assume their organizations were safe if they did not use recent versions of the SolarWinds software, while also pointing out that the hackers did not exploit every network they gained access too.
CISA said it was continuing to analyze the other avenues used by the attackers. So far, the hackers are known to have at least monitored email or other data within the US departments of Defense, State, Treasury, Homeland Security and Commerce.
As many as 18,000 Orion customers downloaded the updates that contained a back door, SolarWinds has said. Since the campaign was discovered, software companies have cut off communication from those back doors to the computers maintained by the hackers.
But the attackers might have installed additional ways of maintaining access, CISA said, in what some have called the biggest hack in a decade.
The Department of Justice, FBI and Defense Department, among others, have moved routine communication onto classified networks that are believed not to have been breached, according to two people briefed on the measures. They are assuming that the non-classified networks have been accessed, the people said.
CISA and private companies including FireEye Inc, which was the first to discover and reveal it had been hacked, have released a series of clues for organizations to look for to see if they have been hit.
But the attackers are very careful and have deleted logs, or electronic footprints or which files they have accessed, security experts said. That makes it hard to know what has been taken.
Some major companies have said they have “no evidence” that they were penetrated, but in some cases that may only be because the evidence was removed.
In most networks, the attackers would also have been able to create false data, but so far it appears they were interested only in obtaining real data, people tracking the probes said.
Meanwhile, members of Congress are demanding more information about what may have been taken and how, along with who was behind it. The House Homeland Security Committee and Oversight Committee announced an investigation Thursday, while senators pressed to learn whether individual tax information was obtained.
In a statement, President-elect Joe Biden said he would “elevate cybersecurity as an imperative across the government” and “disrupt and deter our adversaries” from undertaking such major hacks.
Microsoft says it found malicious software in its systems
https://arab.news/4p796
Microsoft says it found malicious software in its systems
First EU–Saudi roundtable on critical raw materials reflects shared policy commitment
RIYADH: The EU–Saudi Arabia Business and Investment Dialogue on Advancing Critical Raw Materials Value Chains, held in Riyadh as part of the Future Minerals Forum, brought together senior policymakers, industry leaders, and investors to advance strategic cooperation across critical raw materials value chains.
Organized under a Team Europe approach by the EU–GCC Cooperation on Green Transition Project, in coordination with the EU Delegation to Saudi Arabia, the European Chamber of Commerce in the Kingdom and in close cooperation with FMF, the dialogue provided a high-level platform to explore European actions under the EU Critical Raw Materials Act and ResourceEU alongside the Kingdom’s aspirations for minerals, industrial, and investment priorities.
This is in line with Saudi Vision 2030 and broader regional ambitions across the GCC, MENA, and Africa.
ResourceEU is the EU’s new strategic action plan, launched in late 2025, to secure a reliable supply of critical raw materials like lithium, rare earths, and cobalt, reducing dependency on single suppliers, such as China, by boosting domestic extraction, processing, recycling, stockpiling, and strategic partnerships with resource-rich nations.
The first ever EU–Saudi roundtable on critical raw materials was opened by the bloc’s Ambassador to the Kingdom, Christophe Farnaud, together with Saudi Deputy Minister for Mining Development Turki Al-Babtain, turning policy alignment into concrete cooperation.
Farnaud underlined the central role of international cooperation in the implementation of the EU’s critical raw materials policy framework.
“As the European Union advances the implementation of its Critical Raw Materials policy, international cooperation is indispensable to building secure, diversified, and sustainable value chains. Saudi Arabia is a key partner in this effort. This dialogue reflects our shared commitment to translate policy alignment into concrete business and investment cooperation that supports the green and digital transitions,” said the ambassador.
Discussions focused on strengthening resilient, diversified, and responsible CRM supply chains that are essential to the green and digital transitions.
Participants explored concrete opportunities for EU–Saudi cooperation across the full value chain, including exploration, mining, and processing and refining, as well as recycling, downstream manufacturing, and the mobilization of private investment and sustainable finance, underpinned by high environmental, social, and governance standards.
From the Saudi side, the dialogue was framed as a key contribution to the Kingdom’s industrial transformation and long-term economic diversification agenda under Vision 2030, with a strong focus on responsible resource development and global market integration.
“Developing globally competitive mineral hubs and sustainable value chains is a central pillar of Saudi Vision 2030 and the Kingdom’s industrial transformation. Our engagement with the European Union through this dialogue to strengthen upstream and downstream integration, attract high-quality investment, and advance responsible mining and processing. Enhanced cooperation with the EU, capitalizing on the demand dynamics of the EU Critical Raw Materials Act, will be key to delivering long-term value for both sides,” said Al-Babtain.
Valere Moutarlier, deputy director-general for European industry decarbonization, and directorate-general for the internal market, industry, entrepreneurship and SMEs at European Commission, said the EU Critical Raw Materials Act and ResourceEU provided a clear framework to strengthen Europe’s resilience while deepening its cooperation with international partners.
“Cooperation with Saudi Arabia is essential to advancing secure, sustainable, and diversified critical raw materials value chains. Dialogues such as this play a key role in translating policy ambitions into concrete industrial and investment cooperation,” she added.









