Russia linked SolarWinds hack snags widening list of victims

Must read

Bhawani Singhhttps://techmepro.com
I am a blogger who believes in delivering latest tech news from around the world to my viewers.

By: Bloomberg |

December 19, 2020 12:25:33 pm


Russia SolarWinds hack, Russia cyberattack, SolarWinds cyberattack, SolarWinds news, US cyberattack, Russian hackers, US hack, Joe Biden news,The US Department of Energy and its National Nuclear Security Administration, which maintains the country’s nuclear stockpile, said that the malware was isolated to business networks and didn’t affect national security functions (image source: Bloomberg)

It was clear from the start that a cyber-attack by suspected Russian hackers aimed at several US government agencies was going to be bad. One clue: National Security Advisor Robert O’Brien cut short a trip overseas early this week to rush back to Washington to help manage the crisis.

But on Thursday, the reality of just how sprawling and potentially damaging the breach might be, came into sharper focus. It started with a bulletin from the US Cybersecurity and Infrastructure Security Agency, known as CISA, warning that the hackers were sophisticated, patient and well-resourced, representing a “grave risk” to federal, state and local governments as well as critical infrastructure and the private sector. It didn’t take long to see how accurate the agency’s assessment was.


Bloomberg News reported that at least three state governments were hacked. That was followed by reports of other breaches: the city network in Austin, Texas, and the US nuclear weapons agency. Late in the day software giant Microsoft Corp said its systems were exposed.

The US Department of Energy and its National Nuclear Security Administration, which maintains the country’s nuclear stockpile, said that the malware was isolated to business networks and didn’t affect national security functions.

Nonetheless, the effect of Thursday’s revelations was confirmation that no single person or agency — including the highest reaches of the US government — is certain of exactly what the hackers had infiltrated, let alone the full extent of what was taken. A Kremlin official has denied the allegations.


President-elect Joe Biden took time out of his day to issue a statement: “I want to be clear: my administration will make cybersecurity a top priority at every level of government – and we will make dealing with this breach a top priority from the moment we take office.”

So far, President Donald Trump hasn’t commented on the attack, though some members of Congress issued chilling statements, if few actual details.

“We already know enough about the hack to know that it’s deeply damaging and dangerous,” Representative Adam Schiff, chairman of the House Intelligence Committee, said on Thursday.

The hackers installed what is known as a backdoor in widely used software from Texas-based SolarWinds Corp, whose customers include myriad government agencies and Fortune 500 companies. That malicious backdoor, which was installed by some 18,000 SolarWinds customers, allowed the hackers access to their computer networks.

The suspected Russian hackers didn’t have the time nor inclination to raid the computers of all 18,000 customers, so they focused on targets of high value to one of the West’s most pernicious adversaries. US authorities — and governments around the world — are only now beginning to uncover who was unlucky enough to get the hackers’ full attention.

For investigators, the identification of breached agencies — a list that includes the State, Treasury and Commerce departments as well as the Department of Homeland Security — is only the first step. The harder part is determining what the hackers stole while they were roaming through the networks.

On Thursday, CISA, the US cyber agency, suggested there could be an entirely different batch of victims beyond SolarWinds’ customers. The agency said it had evidence that SolarWinds’ Orion software wasn’t the only “access vector” used by the hackers, meaning they could have had other methods of penetrating computer networks.

The Russian attack was uncovered this month after cybersecurity firm FireEye Inc discovered that its computers had been rifled. Microsoft executives said Thursday that a number of cybersecurity companies were among those hacked. That matches a government assessment that such firms were high on the alleged Russia hackers’ priority list, according to a person familiar with the inquiry.

The US is examining the possibility that the hackers were hoping to use their access inside cybersecurity firms to pull off operations similar to SolarWinds — that is, adding manipulated code to the updates those companies regularly send to clients, according to a person familiar with the government’s investigation. Those probes are in early stages, however, and it’s unclear whether the hackers were successful in any of the cases.

Microsoft on Thursday said it detected the backdoor in SolarWinds’ software in its “environment” and had “isolated and removed” it. The company said none of its customer data nor its products were accessed or used to further attacks on others, denying a Reuters report.

In a blog post, Microsoft said it had identified more than 40 customers that the hackers had “targeted more precisely and compromised,” including “security and other technology firms,” think tanks and government contractors, in addition to government agencies. Of the victims, 80% are located in the US while the others are in seven other countries: Canada, Mexico, the UK, Belgium, Spain, Israel and the United Arab Emirates. Microsoft said it expects that number and locations of victims to keep growing.

Federal officials are trying to get a handle on the situation, with senior staff convening daily to coordinate a response to the breach, a Trump administration official said. On Wednesday, they triggered key parts of a cyber-emergency playbook meant to direct government efforts during a crisis. Among other things, that included convening what’s known as a Cyber Unified Coordination Group, which makes it easier to involve private companies like telecommunications firms and big tech providers in the government’s response.

If the hackers had been wandering around sensitive US networks for only a few weeks, all of this would be less of a problem. Instead, the breaches began as long ago as March. That means US officials now face the sobering prospect that foreign hackers had access to many sensitive computer systems for as long as nine months.

With little understanding of exactly how bad the breach of the US government is, members of a consortium of major financial firms that share data on security incidents with the government began considering limiting those communications, a person familiar with the deliberations said.

The executive, whose firm is a member of the Financial Services Information Sharing and Analysis Center, known as FS-ISAC, said in a phone call with senior leadership and executives on Wednesday that members expressed concern that the alleged Russian hackers might be able to steal anything sent to the government. But the group hadn’t yet made a decision on whether or how to limit the information they share, the person said.

Steve Silberstein, the group’s chief executive officer, didn’t directly address whether they were considering limiting information sharing with the government. “The U.S. government does not enjoy privileged access to or control over FS-ISAC or any of its platforms,” he said, adding that the group wasn’t impacted by the SolarWinds backdoor.

📣 The Indian Express is now on Telegram. Click here to join our channel (@indianexpress) and stay updated with the latest headlines

For all the latest Technology News, download Indian Express App.

Source link

More articles

Leave a Reply

Subscribe to our newsletter

To be updated with all the latest news, offers and special announcements.

- Advertisement -

Latest article

Covid-19 pill race heats up as Japanese firm vies with Pfizer, Merck

Osaka-based Shionogi & Co., which helped develop the blockbuster cholesterol drug Crestor, said it designed its pill to attack the Covid-19...

Best deals on gaming laptops, peripherals and more

The Flipkart Big Savings Days sale is here and it brings deals and offers on numerous products including smartphones, TVs, headphones, TVs and...

Buying PS5 isn’t impossible, but people keep making these 3 restock mistakes

Trust and credibility(Image credit: Matt Swider / Instagram)PS5 restock tracker Matt Swider has helped 59,700 people in the US buy a next-gen console...

Gigabyte Aorus FI32U review | TechRadar

Two-minute reviewOf the slew of Aorus gaming monitors that have recently launched, the FI32U is arguably the one that offers the best compromise...
- Advertisement -