id=»article-body» class=»row» section=»article-body»>
A attributed has affected local, state and federal agencies in the US in addition to private companies including Microsoft. Following security researchers’ analysis in December that a second group was likely using SolarWinds software to target organizations, that government officials believe a group of suspected Chinese hackers was responsible for a series of breaches at multiple federal agencies.
The suspected Chinese hack was completely separate from the massive breach announced in December, which reportedly compromised an used by and systems at several other federal agencies. That series of breaches began in March 2020 when hackers compromised IT management software from SolarWinds.
Austin, Texas-based SolarWinds sells software that lets an organization see what’s happening on its computer networks. In the Russia-attributed attack, hackers inserted malicious code into an update of that software platform, which is called Orion. Around the tainted update onto their systems, the company said. The compromised update has had a sweeping impact, the scale of which keeps growing as new information emerges.
In a joint statement on Dec. 12, US national security agencies called the breach «.» According to an analysis by Microsoft and security firm FireEye, both of which were , the gives hackers . By contrast, the reported hacking attack from the suspected Chinese group didn’t infiltrate SolarWinds’ systems, and instead gained access to its target’s systems and then exploited a vulnerability in the Orion software running there.
Microsoft said it had identified that were targeted in the Russia-attributed hack. It’s unknown how many government agencies were affected by the second hacking campaign. More information is likely to emerge about the compromises and their aftermath. Here’s what you need to know about the hacks:
How did hackers sneak malware into a software update?
Hackers managed to access a system that SolarWinds uses to put together updates to its Orion product, the company with the SEC. From there, they inserted malicious code into otherwise legitimate software update. This is known as a because it infects software as it’s under assembly.
It’s a big coup for hackers to pull off a supply-chain attack because it packages their malware inside a trusted piece of software. Hackers typically have to exploit unpatched software vulnerabilities on their targets’ systems to gain access, or trick individual targets into downloading malicious software with a phishing campaign. With a supply chain attack, the hackers could rely on several government agencies and companies to install the Orion update at SolarWinds’ prompting.
The approach is especially powerful in this case because thousands of companies and government agencies around the world reportedly use the Orion software. With the release of the tainted software update, SolarWinds’ vast customer list became potential hacking targets.
Is this the only hacking campaign exploiting SolarWinds software?
SolarWinds has also come under scrutiny for vulnerabilities in its software. These are coding errors and 인계동가라오케 aren’t the result of attackers entering SolarWinds systems to implant malware. Instead, hackers must access victim systems and then exploit the flaws in Orion software running there.
In December, security researchers said forensic investigations of Orion software on systems affected by the tainted update also showed signs that a completely distinct group of attackers was also . On Feb. 2, Reuters reported that government officials believe a group of suspectred Chinese hackers had using a software flaw in Orion. A spokesman for the US Department of Agriculture’s National Finance Center disputed Reuters’ report that hackers had breached its systems.
On Feb. 3, researchers from cybersecurity firm Trustwave released information on products. The bugs have been patched, and there’s no indication they were used in any hacking attacks.
What do we know about Russian involvement in the compromise of SolarWinds’ systems?
US intelligence officials have publicly blamed the supply-chain attack targeting SolarWinds’ internal systems on Russia. The FBI and NSA joined the Cybersecurity and Infrastructure Security Agency and the Office of the Director of National Intelligence on Jan. 5 in saying the hack was «likely Russian in origin,» but stopped short of naming a specific hacking group or Russian government agency as being responsible.
The joint intelligence statement followed remarks from then-Secretary or State Mike Pompeo in a Dec. 18 interview in which . Additionally, news outlets had cited government officials throughout the previous week who said a Russian hacking group is believed to be responsible for the malware campaign. This countered speculation by then-President Donald Trump that
SolarWinds and cybersecurity firms have attributed the hack to «nation-state actors» but haven’t named a country directly.
In a Dec. 13 , the Russian embassy in the US denied responsibility for the SolarWinds hacking campaign. «Malicious activities in the information space contradict the principles of the Russian foreign policy, national interests and our understanding of interstate relations,» the embassy said, adding, «Russia does not conduct offensive operations in the cyber domain.»
Nicknamed APT29 or CozyBear, the hacking group pointed to by news reports has previously been blamed for targeting email systems at the State Department and White House during the administration of President Barack Obama. It was also named by US intelligence agencies as one of the groups that of the , but the leaking of those emails isn’t attributed to CozyBear. (Another Russian agency was blamed for that.)
More recently, the US, 인계동셔츠룸 UK and Canada have identified the group as responsible for hacking efforts that tried to access .
Which government agencies were affected by the tainted update?
According to reports from , and , the update containing malware affected the US departments of , , Commerce and Treasury, as well as the National Institutes of Health. that nuclear programs run by the US Department of Energy and the National Nuclear Security Administration were also targeted.
reported on Dec. 23 that CISA has added local and state governments to the list of victims. According to , the agency is «tracking a significant cyber incident impacting enterprise networks across federal, state, and local governments, as well as critical infrastructure entities and other private sector organizations.»
It’s still unclear what information, if any, was stolen from government agencies, but the amount of access appears to be broad.
Though the and the and have acknowledged the hacks, there’s no official confirmation that other specific federal agencies have been hacked. However, the put out an advisory urging federal agencies to mitigate the malware, noting that it’s » by malicious actors.»
In a statement on Dec. 17, then-President-elect Joe Biden said his administration would «make a top priority from the moment we take office.»
Why is the supply-chain hack a big deal?
In addition to gaining access to several government systems, the hackers turned a run-of-the-mill software update into a weapon. That weapon was pointed at thousands of groups, not just the agencies and companies that the hackers focused on after they installed the tainted Orion update.
Microsoft President Brad Smith called this an «» in a wide-ranging blog post on Dec. 17 that explored the ramifications of the hack. He didn’t directly attribute the hack to Russia but described its previous alleged hacking campaigns as proof of an increasingly fraught cyber conflict.
«This is not just an attack on specific targets,» Smith said, «but on the trust and reliability of the world’s critical infrastructure in order to advance one nation’s intelligence agency.» He went on to call for international agreements to limit the creation of hacking tools that undermine global cybersecurity.
Former Facebook cybersecurity chief Alex Stamos said Dec. 18 on Twitter that the hack could lead to supply-chain attacks . However, he was anything out of the ordinary for 인계동가라오케 a well-resourced intelligence agency.
«So far, all of the activity that has been publicly discussed has fallen into the boundaries of what the US does regularly,» Stamos .
Were private companies or other governments hit with the malware?
Yes. Microsoft confirmed on Dec. 17 that it found , after confirming several days earlier that the breach was affecting its customers. A also said that Microsoft’s own systems were used to further the hacking campaign, 인계동셔츠룸 but Microsoft denied this claim to news agencies. On Dec. 16, the company began known to contain the malware, in order to cut hackers off from its customers’ systems.
FireEye also confirmed that it was infected with the malware and was seeing the infection in customer systems as well.
On Dec. 21, The Wall Street Journal said it had that had installed the malicious software. These include tech companies Cisco, Intel, Nvidia, VMware and Belkin, according to the Journal. The hackers also reportedly had access to the California Department of State Hospitals and Kent State University.
It’s unclear which of SolarWinds’ other private sector customers saw malware infections. The includes large corporations, such as AT&T, Procter & Gamble and McDonald’s. The company also counts governments and private companies around the world as customers. FireEye says many of those customers were infected.
Correction, Dec. 23: This story has been updated to clarify that SolarWinds makes IT management software. An earlier version of the story misstated the purpose of its products.