The Maui News - Weekender

Hacked networks

Not clear what hackers are after

- By FRANK BAJAK

It’s going to take months to kick elite hackers widely believed to be Russian out of the U.S. government networks they have been quietly rifling through since March in Washington’s worst cyberespio­nage failure on record.

Experts say there simply are not enough skilled threat-hunting teams to identify all the government and private-sector systems that may have been hacked. FireEye, the cybersecur­ity company that discovered the intrusion and was among the victims, has already tallied dozens of casualties. It’s racing to identify more.

“We have a serious problem. We don’t know what networks they are in, how deep they are, what access they have, what tools they left,î” said Bruce Schneier, a prominent security expert and Harvard fellow.

It’s not clear exactly what the hackers were seeking, but experts say it could include nuclear secrets, blueprints for advanced weaponry and informatio­n for dossiers on key government and industry leaders.

Many federal workers — and others in the private sector — will now have to presume that unclassifi­ed networks are teeming with spies. Agencies will often have to conduct sensitive government business on Signal, WhatsApp and other encrypted smartphone apps.

“We should buckle up. This will be a long ride,î” said Dmitri Alperovitc­h, co-founder of the leading cybersecur­ity firm CrowdStrik­e. “Cleanup is just phase one.î”

The only way to be sure a network is clean is “to burn it down to the ground and rebuild it,”î Schneier said.

Imagine a computer network as a house you inhabit, and you are certain a serial killer has been there. “You don’t know if he’s gone. How do you get work done? You kind of just hope for the best,î” he said.

Deputy White House press secretary Brian Morgenster­n said Friday that national security adviser Robert O’Brien has been leading multiple daily meetings with the FBI, the Department of Homeland Security and the intelligen­ce community, looking for ways to mitigate the hack.

The Democratic chairs of four House committees given classified briefings on the hack by the Trump administra­tion issued a statement complainin­g that they “were left with more questions than answers.î”

“Administra­tion officials were unwilling to share the full scope of the breach and identities of the victims,î” they said.

President Donald Trump has not commented publicly on the matter.

What makes this hacking campaign so extraordin­ary is its scale — 18,000 organizati­ons were infected from March to June by malicious code that piggybacke­d on popular network-management software from Austin, Texas, company SolarWinds.

Only a sliver of those infections were activated to allow hackers inside. FireEye says it has identified dozens of examples, all “high-value targets.”

Microsoft, which has helped respond, says it has identified more than 40 government agencies, think tanks, government contractor­s, non-government­al organizati­ons and technology companies infiltrate­d by the hackers, 75 percent in the United States.

Florida became the first state to acknowledg­e falling victim. Officials said Friday that hackers apparently infiltrate­d the state’s health care administra­tion agency and others.

SolarWinds’ customers include most prominent Fortune 500 companies, and its U.S. government clients are rich with generals and spymasters.

The difficulty of extracting the suspected Russian hackers’ tool kits is exacerbate­d by the complexity of SolarWinds’ platform, which has dozen of different components.

“This is like doing heart surgery, to pull this out of a lot of environmen­ts,”î said Edward Amoroso, CEO of TAG Cyber.

Security teams then have to assume that the patient is still sick with undetected so-called “secondary infections”î and set up the cyber equivalent of closed-circuit monitoring to make sure the intruders are not still around.

That effort will take months, Alperovitc­h said.

If the hackers are indeed from Russia’s SVR foreign intelligen­ce agency, as experts believe, their resistance may be tenacious. When they hacked the White House, the Joint Chiefs of Staff and the State Department in 2014 and 2015 “it was a nightmare to get them out,”î Alperovitc­h said.

“It was the virtual equivalent of hand-to-hand combat” as defenders sought to keep their footholds, “to stay buried deep insideî and move to other parts of the network” where “they thought that they could remain for longer periods of time.î”

FireEye executive Charles Carmakal said the intruders are especially skilled at camouflagi­ng their movements. Their software effectivel­y does what a military spy often does in wartime — hide among the local population, then sneak out at night and strike.

Rob Knake, the White House cybersecur­ity director from 2011 to 2015, said the harm to the most critical agencies in the U.S. government — defense and intelligen­ce — is going to be limited “as long as there is no evidence that the Russians breached classified networks.î”

During the 2014-15 hack, “we lost access to unclassifi­ed networks but were able to move all operations to classified networks with minimal disruption­s,î” he said via email.

The Pentagon has said it has so far not detected any intrusions in any of its networks — classified or unclassifi­ed.

Given the fierce tenor of cyberespio­nage — the U.S., Russia and China all have formidable offensive hacking teams and have been penetratin­g each others’ government networks for years — many American officials are wary of putting anything sensitive on government networks.

Amoroso, of TAG Cyber, recalled the famous pre-election dispute in 2016 over classified emails sent over a private server set up by Democratic presidenti­al candidate Hillary Clinton when she was secretary of state. Clinton was investigat­ed by the FBI in the matter, but no charges were brought.

“I used to make the joke that the reason the Russians didn’t have Hillary Clinton’s email is because she took it off the official State Department network,”î Amoroso said.

It’s not clear exactly what the hackers were seeking,butexperts­sayitcould­includenuc­lear secrets, blueprints for advanced weaponry and informatio­nfordossie­rsonkeygov­ernmentand industryle­aders.

Newspapers in English

Newspapers from United States