Greenwich Time

Cybersecur­ity firm FireEye hacked by

-

BOSTON — Prominent U.S. cybersecur­ity firm FireEye said Tuesday that foreign government hackers with “world-class capabiliti­es” broke into its network and stole offensive tools it uses to probe the defenses of its thousands of customers, who include federal, state and local government­s and top global corporatio­ns.

The hackers “primarily sought informatio­n related to certain government customers,” FireEye CEO Kevin Mandia said in a statement, without naming them. He said there was no indication they got customer informatio­n from the company’s consulting or breach-response businesses or threat-intelligen­ce data it collects.

FireEye is a major cybersecur­ity player — it responded to the Sony and Equifax data breaches and helped Saudi Arabia thwart an oil industry cyberattac­k — and has played a key role in identifyin­g Russia as the protagonis­t in numerous aggression­s in the burgeoning netherworl­d of global digital conflict.

Neither Mandia nor a FireEye spokeswoma­n said when the company detected the hack or who might be responsibl­e. But many in the cybersecur­ity community suspect Russia.

“I do think what we know of the operation is consistent with a Russian state actor,“said former NSA hacker Jake Williams, president of Rendition Infosec. “Whether or not customer data was accessed, it’s still a big win for Russia.”

FireEye’s Mandia said he had concluded that “a nation with top-tier offensive capabiliti­es” was behind the attack.

The stolen “red team” tools — which amount to real-world malware — could be dangerous in the wrong hands. FireEye said there’s no indication they have been used maliciousl­y. But cybersecur­ity experts say sophistica­ted nationstat­e hackers could modify them and wield them in the future against government or industry targets.

The hack was the biggest blow to the U.S. cybersecur­ity community since a mysterious group known as the “Shadow Brokers” in 2016 released a trove of highlevel hacking tools stolen from the National Security Agency. The U.S. believes North Korea and Russia capitalize­d on the stolen tools to unleash devastatin­g global cyberattac­ks.

The nation’s Cybersecur­ity and Infrastruc­ture Security Agency warned that “unauthoriz­ed third-party users” could similarly abuse FireEye’s stolen redteam tools.

Milpitas, Calif.-based FireEye, which is publicly traded, said in Tuesday’s statement that it had developed 300 countermea­sures to protect customers and others from them and was making them immediatel­y available.

FireEye has been at the forefront of investigat­ing state-backed hacking groups, including Russian groups trying to break into state and local government­s in the U.S. that administer elections. It was credited with attributin­g to Russian military hackers mid-winter attacks in 2015 and 2016 on Ukraine’s energy grid. Its threat hunters also have helped social media companies including Facebook identify malicious actors.

Thomas Rid, a Johns Hopkins cyberconfl­ict scholar, said that if the Kremlin were behind the hack it could have been seeking to learn what FireEye knows about Russia’s global state-backed operations — doing counterint­elligence. Or it might have seeking to retaliate against the U.S. government for measures including indicting Russian military hackers for meddling in the 2016 U.S. election and other alleged crimes. FireEye is, after all, a close U.S. government partner that has “exposed many Russian operations,“he said.

FireEye said it is investigat­ing the attack in coordinati­on with the FBI and partners including Microsoft, which has its own cybersecur­ity team. Mandia said the hackers used “a novel combinatio­n of techniques not witnessed by us or our partners in the past.”

Matt Gorham, assistant director of the FBI’s cyber division, said the hackers’ “high level of sophistica­tion (was) consistent with a nation state.”

The U.S. government is “focused on imposing risk and consequenc­es on malicious cyber actors, so they think twice before attempting an intrusion in the first place,” Gorham said. That has included what U.S. Cyber Command terms “defending forward” operations such as penetrated the networks of Russia and other adversarie­s.

U.S. Sen. Mark Warner, a Virginia Democrat on the Senate’s intelligen­ce committee, applauded FireEye for quickly disclosing the intrusion, saying the case “shows the difficulty of stopping determined nation-state hackers.”

Cybersecur­ity expert Dmitri Alperovitc­h said security companies like FireEye are top targets, with big names in the field including Kaspersky and Symantec breached in the past.

Newspapers in English

Newspapers from United States