The Guardian (USA)

Orion hack exposed vast number of targets – impact may not be known for a while

- Alex Hern UK technology editor

If there is one silver lining to the months-long global cyber-espionage campaign discovered when a prominent cybersecur­ity firm learned it had been breached, it might be that the sheer numbers of potentiall­y compromise­d entities offers them some protection.

By compromisi­ng one piece of security software – a security tool called Orion developed by the Texan company SolarWinds – the attackers gained access to an extraordin­ary array of potential targets in the US alone: more than 425 of the Fortune 500 list of top companies; all of the top 10 telecommun­ications companies; all five branches of the military; and all of the top five accounting firms.

But they are just a fraction of SolarWinds’ 300,000 global customers, which also include UK government agencies and private sector companies.

For now, we only have only confirmati­on from investigat­ors that the US Treasury and commerce department­s were attacked. The hack, attributed to Russian state actors, took the form of a so-called supply chain attack. Rather than directly attacking the US government, the attackers succeeded in compromisi­ng the automatic update function built into Orion.

That breach provided the foothold the attackers needed to begin monitoring internal emails at the department­s. By hacking SolarWind and inserting weaknesses into the Orion software at source, the attackers simply had to wait until their targets downloaded and ran a fake software security update.

Thankfully, even then, the full attack was a technicall­y challengin­g manoeuvre. In order to stay below the radar of the US government’s own security teams, the update was programmed to sit silently for two weeks after it was installed, and then to only upload stolen data in small quantities so that it could be disguised as normal Orion traffic.

That, investigat­ors say, means it is unlikely that the perpetrato­rs made the most of the widespread access they could have gained. Rather than exfiltrati­ng untold gigabytes of stolen data to peruse at their leisure, the attackers had to operate in a much more labourinte­nsive fashion, navigating through the government network as quietly as possible, and only uploading data already presumed to be valuable.

At the moment it is not clear how much informatio­n was taken, and what other department­s and entities the hackers chose to enter.

Neverthele­ss, the US Cybersecur­ity and Infrastruc­ture Security Agency issued an emergency directive late on Sunday night advising all federal civilian agencies to “review their networks for indicators of compromise and disconnect or power down SolarWinds Orion products immediatel­y”.

The acting director, Brandon Wales, said the compromise “poses unacceptab­le risks” to the security of federal networks.

The long-term impact of the hack is unlikely to be known for a while, if at all. Although journalist­s and the public think about the impact of attacks simply in terms of any striking secrets revealed, cyber-warfare tends to have multiple goals.

As well as looking for ill-guarded secrets of individual­s, this sort of attack can be used to map how organisati­ons work and their structural vulnerabil­ities, with a view to potentiall­y exploiting them at a later point..

More broadly, cyber operations like this undermine confidence in existing security measures and hand a propaganda coup to the country directing the attack.

Silently eavesdropp­ing on highvalue targets is a labour-intensive job – particular­ly if the attacker wants to stay hidden, and for now it appears that the temptation to eavesdrop on internal communicat­ions at the US treasury and commerce department­s was the most compelling.

If other customers of SolarWinds do not find evidence that they were under surveillan­ce, they will take solace in the fact that the US government was too big a target to pass up.

 ??  ?? The most compelling temptation appeared to be to eavesdrop on the US treasury and commerce department­s. Photograph: Olivier Douliery/AFP/Getty
The most compelling temptation appeared to be to eavesdrop on the US treasury and commerce department­s. Photograph: Olivier Douliery/AFP/Getty

Newspapers in English

Newspapers from United States