East Bay Times

FireEye, a top cybersecur­ity firm, says it was hacked

- By David E. Sanger and Nicole Perlroth

WASHINGTON >> For years, the cybersecur­ity firm FireEye has been the first call for government agencies and companies around the world who have been hacked by the most sophistica­ted attackers, or fear they might be.

Now it looks like the hackers — in this case, evidence points to Russia’s intelligen­ce agencies — may be exacting their revenge.

FireEye revealed Tuesday that its own systems were pierced by what it called “a nation with toptier offensive capabiliti­es.” The company said hackers used “novel techniques” to make off with its own toolkit, which could be useful in mounting new attacks around the world.

It was a stunning theft, akin to bank robbers who, having cleaned out local vaults, then turned around and stole the FBI’s investigat­ive tools. In fact, FireEye said Tuesday, moments after the stock market closed, that it had called in the FBI.

The $ 3.5 billion company, which partly makes a living by identifyin­g the culprits in some of the world’s boldest breaches its clients have included Sony and Equifax declined to say explicitly who was responsibl­e. But its descriptio­n, and the fact that the FBI has turned the case over to its Russia specialist­s, left little doubt who the lead suspects were and that they were after what the company calls “Red Team tools.”

These are essentiall­y digital tools that replicate the most so

phisticate­d hacking tools in the world. FireEye uses the tools with the permission of a client company or government agency to look for vulnerabil­ities in their systems. Most of the tools are based in a digital vault that FireEye closely guards.

The hack raises the possibilit­y that Russian intelligen­ce agencies saw an advantage in mounting the attack while American attention including FireEye’s was focused on securing the presidenti­al election system. At a moment that the nation’s pub

lic and private intelligen­ce systems were seeking out breaches of voter registrati­on systems or voting machines, it may have a been a good time for those Russian agencies, which were involved in the 2016 election breaches, to turn their attention to other targets.

The hack was the biggest known theft of cybersecur­ity tools since those of the National Security Agency were purloined in 2016 by a still- unidentifi­ed group that calls itself the ShadowBrok­ers. That group dumped the NSA’s hacking tools online over several months, handing nation- states and hackers the “keys to the digital kingdom,” as one former

NSA operator put it. North Korea and Russia ultimately used the NSA’s stolen weaponry in destructiv­e attacks on government agencies, hospitals and the world’s biggest conglomera­tes at a cost of more than $10 billion.

The NSA’s tools were most likely more useful than FireEye’s since the U. S. government builds pur pose - ma de d ig it a l weapons. FireEye’s Red Team tools are essentiall­y built from malware that the company has seen used in a wide range of attacks.

Still, the advantage of using stolen weapons is that nation-states can hide their own tracks when they launch attacks.

Newspapers in English

Newspapers from United States