The Norwalk Hour

Hacked networks will need to be burned ‘down to the ground’

-

It’s going to take months to kick elite hackers widely believed to be Russian out of the U.S. government networks they have been quietly rifling through since as far back as March in Washington’s worst cyberespio­nage failure on record.

Experts say there simply are not enough skilled threat-hunting teams to identify all the government and private-sector systems that may have been hacked. FireEye, the cybersecur­ity company that discovered the worst-ever intrusion into U.S. agencies and was among the victims, has already tallied dozens of casualties. It’s racing to identify more.

“We have a serious problem. We don’t know what networks they are in, how deep they are, what access they have, what tools they left,” said Bruce Schneier, a prominent security expert and Harvard fellow.

It’s not known exactly what the hackers were seeking, but experts say it could include nuclear secrets, blueprints for advanced weaponry and informatio­n for dossiers on key government and industry leaders.

That means many federal workers — and others in the private sector — will have to presume that unclassifi­ed networks are teeming with spies. Agencies will often have to conduct sensitive government business on Signal, WhatsApp and other encrypted smartphone apps.

“We should buckle up. This will be a long ride,” said Dmitri Alperovitc­h, co-founder and former chief technical officer of the leading cybersecur­ity firm CrowdStrik­e. “Cleanup is just phase one.”

The only way to be sure a network is clean is “to burn it down to the ground and rebuild it,” Schneier said. It’s the only way to be sure an intruder is out.

Imagine a computer network as a mansion you inhabit, and you are certain a serial killer as been there. “You don’t know if he’s gone. How do you get work done? You kind of just hope for the best,” he said.

Deputy White House press secretary Brian Morgenster­n told reporters Friday that national security adviser Robert O’Brien has sometimes been leading multiple daily meetings with the FBI, the Department of Homeland Security and the intelligen­ce community, looking for ways to

mitigate the hack.

He would not provide details, “but rest assured we have the best and brightest working hard on it each and every single day.”

President Donald Trump, who has downplayed the Russian cyberthrea­t after refusing to accept that a Kremlin hack-and-leak operation favored him in the 2016 election, has said nothing publicly about the SolarWinds attack. But Morgenster­n said he has been briefed.

There is little incentive for the White House to disclose which agencies were hacked. That only helps U.S. adversarie­s, national security experts said.

What makes this hacking campaign so extraordin­ary is its scale — 18,000 organizati­ons were infected from March to June by malicious code that piggybacke­d on popular networkman­agement software from an Austin, Texas, company called SolarWinds.

Only a sliver of those infections were

activated. FireEye says it has identified dozens, all “high-value targets.” Microsoft, which has helped respond, says it has identified more than 40 government agencies, think tanks, government contractor­s, non-government­al organizati­ons and technology companies infiltrate­d by the hackers, 80 percent of them in the United States.

SolarWinds’ customers include most prominent Fortune 500 companies, and it’s U.S. government clients are rich with generals and spymasters.

Extracting the suspected Russian hackers’ tool kits from victims is exacerbate­d by the complexity of SolarWinds’ platform with its dozen different components.

“This is like doing heart surgery, to pull this out of a lot of environmen­ts,” said Edward Amoroso, CEO of TAG Cyber.

Security teams then have to assume that the patient is still sick with undetected so-called “secondary infections” and set up the cyber equivalent of closed-circuit monitoring to make sure the intruders are not still around, sneaking out internal emails and other

sensitive data.

That effort will take months, Alperovitc­h said.

If the hackers are indeed from Russia’s SVR foreign intelligen­ce agency, as experts believe, their resistance may be tenacious. When they hacked the White House, the Joint Chiefs of Staff and the State Department in 2014 and 2015 “it was a nightmare to get them out,” Alperovitc­h said.

“It was the virtual equivalent of hand-to-hand combat” as defenders sought to keep their footholds, “to stay buried deep inside” and move to other parts of the network where “they thought that they could remain for longer periods of time.”

“We’re likely going to face the same in this situation as well,” he added.

FireEye executive Charles Carmakal said the intruders are especially skilled at camouflagi­ng their movements. Their software effectivel­y does what a military spy often does in wartime — hide among the local population, then sneak out at night and strike.

“It’s really hard to catch some of these,” he said.

 ?? Associated Press ?? FireEye’s offices in Milpitas, Calif. Experts say it’s going to take months to kick elite hackers widely believed to be Russian out of U.S. government networks. FireEye is the cybersecur­ity company that discovered the worst-ever intrusion into U.S. agencies and was among the victims.
Associated Press FireEye’s offices in Milpitas, Calif. Experts say it’s going to take months to kick elite hackers widely believed to be Russian out of U.S. government networks. FireEye is the cybersecur­ity company that discovered the worst-ever intrusion into U.S. agencies and was among the victims.

Newspapers in English

Newspapers from United States