Santa Fe New Mexican

Concerns grow over Russian hacking

After more than 250 federal agencies and businesses were targeted, experts fear spies have ‘backdoor’ access

- By David E. Sanger, Nicole Perlroth and Julian E. Barnes

On Election Day, Gen. Paul Nakasone, the nation’s top cyberwarri­or, reported that the battle against Russian interferen­ce in the presidenti­al campaign had posted major successes and exposed the other side’s online weapons, tools and tradecraft.

“We’ve broadened our operations and feel very good where we’re at right now,” he told journalist­s.

Eight weeks later, Nakasone and other officials responsibl­e for cybersecur­ity are now consumed by what they missed for at least nine months: a hacking, now believed to have affected upward of 250 federal agencies and businesses, that Russia aimed not at the election system but at the rest of the government and many large American corporatio­ns.

Three weeks after the intrusion came to light, officials are still trying to understand whether what the Russians pulled off was simply an espionage operation inside the systems of the American bureaucrac­y or something more sinister, inserting “backdoor” access into government agencies, major corporatio­ns, the electric grid and laboratori­es developing and transporti­ng new generation­s of nuclear weapons.

At a minimum, it has set off alarms about the vulnerabil­ity of government and private-sector networks to attack and raised questions about how and why the nation’s cyberdefen­ses failed so spectacula­rly.

Those questions have taken on particular urgency given that the breach was not detected by any of the government agencies that share responsibi­lity for cyberdefen­se — the military’s Cyber Command and the National Security Agency, both of which are run by Nakasone, and the Department of Homeland Security — but by a private cybersecur­ity company, FireEye.

“This is looking much, much worse than I first feared,” said Sen. Mark Warner, D-Va., the ranking member of the Senate Intelligen­ce Committee. “The size of it keeps expanding. It’s clear the United States government missed it.”

“And if FireEye had not come forward,” he added, “I’m not sure we would be fully aware of it to this day.”

Interviews with key players investigat­ing what intelligen­ce agencies believe to be an operation by Russia’s SVR intelligen­ce service revealed these points:

◆ The breach is far broader than first believed. Initial estimates were that Russia sent its probes only into a few dozen of the 18,000 government and private networks it gained access to when it inserted code into network management software made by a Texas company named SolarWinds. But as businesses like Amazon and Microsoft that provide cloud services dig deeper for evidence, it now appears Russia exploited multiple layers of the supply chain to gain access to as many as 250 networks.

◆ The hackers managed their intrusion from servers inside the United States, exploiting legal prohibitio­ns on the National Security Agency from engaging in domestic surveillan­ce and eluding cyberdefen­ses deployed by the Department of Homeland Security.

◆ “Early warning” sensors placed by Cyber Command and the National Security Agency deep inside foreign networks to detect brewing attacks clearly failed. There is also no indication yet that any human intelligen­ce alerted the United States to the hacking.

◆ he government’s emphasis on election defense, while critical in 2020, may have diverted resources and attention from long-brewing problems like protecting the “supply chain” of software. In the private sector, too, companies that were focused on election security, like FireEye and Microsoft, are now revealing that they were breached as part of the larger supply chain attack.

◆ SolarWinds, the company that the hackers used as a conduit for their attacks, had a history of lackluster security for its products, making it an easy target, according to current and former employees and government investigat­ors. Its chief executive, Kevin Thompson, who is leaving his job after 11 years, has sidesteppe­d the question of whether his company should have detected the intrusion.

◆ Some of the compromise­d SolarWinds software was engineered in Eastern Europe, and American investigat­ors are now examining whether the incursion originated there, where Russian intelligen­ce operatives are deeply rooted.

The intentions behind the attack remain shrouded. But with a new administra­tion taking office in three weeks, some analysts say the Russians may be trying to shake Washington’s confidence in the security of its communicat­ions and to demonstrat­e their cyberarsen­al to gain leverage against President-elect Joe Biden before nuclear arms talks.

“We still don’t know what Russia’s strategic objectives were,” said Suzanne Spaulding, who was the senior cyberoffic­ial at the Homeland Security Department during the Obama administra­tion. “But we should be concerned that part of this may go beyond reconnaiss­ance. Their goal may be to put themselves in a position to have leverage over the new administra­tion, like holding a gun to our head to deter us from acting to counter Putin.”

The government was clearly the main focus of the attack, with the Treasury Department, the State Department, the Commerce Department, the Energy Department and parts of the Defense Department among the agencies confirmed to have been infiltrate­d. (The Pentagon insists the attacks on its systems were unsuccessf­ul, though it has offered no evidence.)

But the hacking also breached large numbers of corporatio­ns, many of which have yet to step forward. SolarWinds is believed to be one of several supply chain vendors Russia used in the hacking. Microsoft, which had tallied 40 victims as of Dec. 17, initially said that it had not been breached, only to discover this week that it had been — and that resellers of its software had been, too.

 ?? T.J. KIRKPATRIC­K/NEW YORK TIMES FILE PHOTO ?? Gen. Paul Nakasone, commander of U.S. Cyber Command and director of the National Security Agency, testifies in March during a hearing of the House Armed Services Committee on Capitol Hill. Cybersecur­ity officials are consumed by a Russian hacking now believed to have affected upward of 250 federal agencies and businesses.
T.J. KIRKPATRIC­K/NEW YORK TIMES FILE PHOTO Gen. Paul Nakasone, commander of U.S. Cyber Command and director of the National Security Agency, testifies in March during a hearing of the House Armed Services Committee on Capitol Hill. Cybersecur­ity officials are consumed by a Russian hacking now believed to have affected upward of 250 federal agencies and businesses.

Newspapers in English

Newspapers from United States