Santa Fe New Mexican

Tactics unseen used in U.S. hacks

- By Craig Timberg and Ellen Nakashima

WASHINGTON — Federal investigat­ors reported Thursday on evidence of previously unknown tactics for penetratin­g government computer networks, a developmen­t that underscore­s the disastrous reach of Russia’s recent intrusions and the logistical nightmare facing federal officials trying to purge intruders from key systems.

The troubling developmen­t comes as news broke of more federal agencies falling victim to the Russian hacking case. The latest to discover evidence of compromise are the Department of Energy and the National Nuclear Security Administra­tion, which manages the country’s nuclear weapons stockpile, according to a U.S. official who spoke on the condition of anonymity because of the matter’s sensitivit­y. The latest breaches were first reported by Politico.

For days it has been clear that compromise­d software patches distribute­d by a Texas-based company, SolarWinds Corp., were central to Russian efforts to gain access to U.S. government computer systems. But Thursday’s alert from the Cybersecur­ity and Infrastruc­ture Security Agency at the Department of Homeland Security said evidence suggested there was other malware used to initiate what the alert described as “a grave risk to the Federal Government and state, local, tribal, and territoria­l government­s as well as critical infrastruc­ture entities and other private sector organizati­ons.”

While many details remained unclear, the revelation about new modes of attack raises fresh questions about the access that Russian hackers were able to gain in government and corporate systems worldwide.

“This adversary has demonstrat­ed an ability to exploit software supply chains and shown significan­t knowledge of Windows networks,” the alert said. “It is likely that the adversary has additional initial access vectors and tactics, techniques, and procedures [TTPs] that have not yet been discovered.”

The U.S. government has not publicly blamed Russia for the hacks, but U.S. officials speaking privately say that Russian government hackers were behind the operation. Moscow has denied any involvemen­t.

The alert cited a blog post this week from Volexity, a Reston, Va.-based cybersecur­ity company, about repeated intrusions into an unnamed think thank that, according to the company, took place over several years without being detected. The attackers, who are described using only a pseudonym in the Volexity post, gained access to the think tank’s networks using “multiple tools, backdoors, and malware implants” and exploited a vulnerabil­ity in Microsoft’s Exchange Control Panel software, which is central to the company’s email services.

Microsoft did not respond to a request for comment.

Only the last of three separate intrusions against the think tank, in June and July, involved a corrupted patch from SolarWinds, suggesting an aggressive, persistent hacking team with numerous sophistica­ted tactics at its disposal.

The list of known victims of the Russian hacks reported last weekend includes agencies that are central to U.S. national security and other core government functions, including the State, Treasury, Commerce and Homeland Security department­s, as well as the National Institutes of Health. Thousands of private companies worldwide also were potentiall­y affected, many in sensitive industries, after they uploaded software patches that were infused with malware, reportedly by Russia’s foreign intelligen­ce service, known as the SVR.

Purging the intruders and restoring security to affected networks could take months, some experts say.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from United States