Santa Fe New Mexican

Russia suspected in hacks targeting frail U.S. supply chains

- By Jordan Robertson and William Turton

For years, U.S. officials have warned about the dangers of cyberattac­ks involving the electronic­s supply chain. This week’s revelation that a growing number of federal agencies were breached in a widespread attack by suspected Russian hackers shows how little they have followed their own advice.

Last year, for instance, the Cybersecur­ity and Infrastruc­ture Security Agency, known as CISA, reported that federal agencies faced about 180 different threats from the digital supply chain, the hardware and software that goes into making up a computer network. CISA’s parent, the Department of Homeland Security, was among those agencies breached in the recent attack.

The attack involved code embedded in updates for widely used network-management software made by SolarWinds Corp., which provides administra­tors with tools to manage and update their computer networks.

Lawmakers who received a classified briefing on the attack indicate that it is among the most serious in recent years. Sen. Richard Blumenthal, D-Conn., said in a tweet Tuesday that the briefing left him “deeply alarmed, in fact downright scared.” Dick Durbin, the Senate’s second highest-ranking Democrat, said on CNN Wednesday that the hack was “virtually a declaratio­n of war.”

Despite those public pronouncem­ents, a blistering report by a government watchdog that was completed in October and released Tuesday shows that the risks that led to these intrusions are far from new, and that U.S. agencies have failed for years to implement recommende­d safeguards for their informatio­n technology supply chains.

Part of the problem: This issue is an IT department’s nightmare, and the interconne­cted nature of the global supply chain makes it nearly impossible to ensure that anyone’s doing it correctly.

The report, by the U.S. Government Accountabi­lity Office, found that 14 out of the 23 surveyed federal agencies hadn’t implemente­d any of the “foundation­al practices” to protect their informatio­n and communicat­ions technology supply chains, and none of the agencies had implemente­d all of them. Those practices had been recommende­d in 2015 by the National Institute of Standards and Technology, and the following year, the Office of Management and Budget required the agencies to implement the changes.

The agencies that were surveyed included several — the department­s of Commerce, Homeland Security, Treasury and State — that were breached as part of the recent attack, though the report doesn’t specify what particular agencies did — or didn’t do — with the recommenda­tions. “Supply chains are being targeted by increasing­ly sophistica­ted threat actors, including foreign cyber threat nations such as Russia, China, Iran and North Korea,” the report states. “Attacks by such entities are often especially sophistica­ted and difficult to detect.”

The report warned of hackers inserting backdoors — methods used to get around normal security measures and gain access on a computer system — through the supply chain, and of the potentiall­y dire consequenc­es of a successful attack.

Hackers could “take control of federal informatio­n systems, decrease the availabili­ty of materials or services needed to develop systems and destroy systems, causing injury and loss of life, and compromisi­ng national security.”

Newspapers in English

Newspapers from United States