In a blog post overnight, the Microsoft Security Response Centre team said: "There was no case where all repositories related to any single product or service were accessed.
"There was no access to the vast majority of source code. For nearly all of code repositories accessed, only a few individual files were viewed as a result of a repository search."
The blog post said: "For a small number of repositories, there was additional access, including in some cases, downloading component source code. These repositories contained code for:
- "a small subset of Azure components (subsets of service, security, identity);
- "a small subset of Intune components; and
- "a small subset of Exchange components."
The company said its investigations into the attack, which are now complete, showed that the first access of its internal systems by the attackers was in late November.
"[This] ended when we secured the affected accounts. We continued to see unsuccessful attempts at access by the actor into early January 2021, when the attempts stopped," the MSRC team wrote.
The breach came to light on 9 December AEDT when the American cyber security firm FireEye announced that its Red Team tools had been stolen.
The US has not yet made any substantial claims as to who was responsible, though there has been the usual Russia hysteria that accompanies any cyber attack affecting the country.