The Guardian (USA)

Code deployed in US cyber-attack linked to suspected Russian hackers

- Andrew Roth in Moscow

A Moscow-based cybersecur­ity company has reported that some of the malicious code employed against the US government in a cyber-attack last month overlaps with code previously used by suspected Russian hackers.

The findings by Kaspersky investigat­ors may provide the first public evidence to support accusation­s from Washington that Moscow was behind the biggest cyber-raid against the government in years, affecting 18,000 users of software produced by SolarWinds, including US government agencies.

However, investigat­ors from Kaspersky have cautioned that the code similariti­es do not confirm that the same group is behind both attacks.

According to findings, published by the investigat­ors Georgy Kucherin, Igor Kuznetsov, and Costin Raiu, a “backdoor” called Sunburst used to communicat­e with a server controlled by the hackers resembled another hacking tool called Kazuar, which had previously been attributed to the Turla APT (advanced persistent threat) group.

Attacks by Turla have been documented from at least 2008, when the group was believed to have infiltrate­d US Central Command. Later, Turla was implicated in attacks on embassies in a number of countries, ministries, utilities, healthcare providers, and other targets. Several cybersecur­ity companies have said they believe the hacking team is Russian, and an Estonian intelligen­ce report from 2018 says the group is “tied to the federal security service, FSB”.

US intelligen­ce agencies last week released a joint statement accusing Moscow of launching the attack, which they said was “ongoing” more than a month after being made public.

Moscow has denied responsibi­lity.

The Sunburst backdoor used in the recent attack allowed the hackers to receive reports on infected computers and then target those they deemed interestin­g for further exploitati­on. The vast majority of the 18,000 infected machines were not referred for further exploitati­on, showing that the attack was highly targeted.

The Kaspersky investigat­ors found that functions that kept the malware dormant for weeks, as well as how it coded informatio­n about targets, appeared to have links to Kazuar, which was first reported by Palo Alto Networks in 2017. “A hallmark of Turla operations is iterations of their tools and code lineage in Kazuar can be traced back to at least 2005,” the cybersecur­ity firm reported then.

The Kaspersky investigat­ors said there could be other explanatio­ns for the coding overlap besides Turla being behind the SolarWinds attack. It is possible the attackers were “inspired” by the Kazuar code; that both groups obtained their malware from the same source; that a former member of Turla brought the code to a new team; or that the code was used as a “false flag”, deployed in the attack specifical­ly to attract blame against Turla and implicate Moscow.

“Neverthele­ss, they are curious coincidenc­es,” the group wrote. “One coincidenc­e wouldn’t be that unusual, two coincidenc­es would definitive­ly raise an eyebrow, while three such coincidenc­es are kind of suspicious to us.”

 ??  ?? The SolarWinds headquarte­rs in Austin, Texas. Up to 18,000 customers of the US software maker were compromise­d by the hack. Photograph: Sergio Flores/Reuters
The SolarWinds headquarte­rs in Austin, Texas. Up to 18,000 customers of the US software maker were compromise­d by the hack. Photograph: Sergio Flores/Reuters

Newspapers in English

Newspapers from United States