Dayton Daily News

How Chinese hackers got into U.S. systems

Vulnerable system sallow ed Chinese intruders to access troves of data.

- David E. Sanger, Nicole Perlroth and Michael D. Shear ©2015 The New York Times

vulnerable u.s. systems allowed chinese hackers, whom u.s. intelligen­ce lost track of last summer, to gain administra­tive privileges to u.s. government computer systems containing troves of personnel data, u.s. officials say,

For more than five years, U.S. intelligen­ce agencies followed several groups of Chinese hackers who were systematic­ally draining informatio­n from defense contractor­s, energy firms and electronic­s makers, their targets shifting to fit Beijing’s latest economic priorities.

But last summer, officials lost the trail as some of the hackers changed focus again, burrowing deep into U.S. government computer systems that contain vast troves of personnel data, according to U.S. officials briefed on a federal investigat­ion into the attack and private security experts.

Undetected for nearly a year, the Chinese intruders executed a sophistica­ted attack that gave them “administra­tor privileges” into the computer networks at the Office of Personnel Management, mimicking the credential­s of people who run the agency’s systems, two senior administra­tion officials said. The hackers began siphoning out a rush of data after constructi­ng what amounted to an electronic pipeline that led back to China, investigat­ors told Congress last week in classified briefings.

Much of the personnel data had been stored in the lightly protected systems of the Interior Department because it had cheap, available space for digital data storage. The hackers’ ultimate target: the 1 million or so federal employees and contractor­s who have filled out a form known as SF-86, which is stored in a different computer bank and details personal, financial and medical histories for anyone seeking a security clearance.

“This was classic espionage, just on a scale we’ve never seen before from a traditiona­l adversary,” one senior administra­tion official said. “And it’s not a satisfacto­ry answer to say, ‘We found it and stopped it,’ when we should have seen it coming years ago.”

The administra­tion is urgently working to determine what other agencies are storing similarly sensitive informatio­n with weak protection­s. Officials would not identify their top concerns, but an audit issued early last year, before the Chinese attacks, harshly criticized lax security at the Internal Revenue Service, the Nuclear Regulatory Commission, the Energy Department, the Securities and Exchange Commission and the Department of Homeland Security, which has responsibi­lity for securing the nation’s critical networks.

At the Nuclear Regulatory Commission, which regulates nuclear facilities, informatio­n about crucial components was left on unsecured network drives, and the agency lost track of laptops with critical data.

Computers at the IRS allowed employees to use weak passwords like “password.” One report detailed 7,329 “potential vulnerabil­ities” because software patches had not been installed. Auditors at the Department of Education, which stores informatio­n from millions of student loan applicants, were able to connect “rogue” computers and hardware to the network without being noticed. And at the Securities and Exchange Commission, part of the network had no firewall or intrusion protection for months.

“We are not where we need to be in terms of federal cybersecur­ity,” said Lisa Monaco, President Barack Obama’s homeland security adviser. At an Aspen Institute conference in Washington on Tuesday, she blamed outof-date “legacy systems” that have not been updated for a modern, networked world where remote access is routine. The systems are not continuous­ly monitored to know who is online, and what kind of data they are shipping out.

In congressio­nal testimony and in interviews, officials investigat­ing the breach at the personnel office have struggled to explain why the defenses were so poor for so long. Last week, the office’s director, Katherine Archuleta, stumbled through a two-hour congressio­nal hearing. She was unable to say why the agency did not follow through on inspector general reports, dating to 2010, that found severe security lapses and recommende­d shutting down systems with security clearance data.

When she failed to explain why much of the informatio­n in the system was not encrypted — something that is standard today on iPhones, for example — Rep. Stephen F. Lynch, D-Mass., who usually supports Obama’s initiative­s, snapped at her. “I wish that you were as strenuous and hardworkin­g at keeping informatio­n out of the hands of hackers,” he said, “as you are keeping informatio­n out of the hands of Congress and federal employees.”

Her performanc­e in classified briefings also frustrated several lawmakers. “I don’t get the sense at all they understand the problem,” said Rep. Jim Langevin, D-R.I., who called for Archuleta’s resignatio­n. “They seem like deer in the headlights.”

Josh Earnest, the White House spokesman, said Wednesday that Obama remained confident that Archuleta “is the right person for the job.” Archuleta, who took office in November 2013, did not respond to a request for an interview.

Federal and private investigat­ors piecing together the attacks now say they believe the same groups responsibl­e for the attacks on the personnel office and the contractor had previously intruded on computer networks at health insurance companies, notably Anthem Inc. and Premera Blue Cross.

his was classic espionage, just ona scale we’ve never seen before from a traditiona­l adversary. And it’s not a satisfacto­ry answer tosay, “We found it and stopped it,” when we should have seen it com ing years ago.’ Senior administra­tion official

 ?? CLIFF OWEN / ASSOCIATED PRESS ?? TOP: A man walks past an employees entrance sign outside the U.S. Office of Personnel Management (OPM). ABOVE: OPMDirecto­r Katherine Archuleta testifies Tuesday on the cyberattac­k.
CLIFF OWEN / ASSOCIATED PRESS TOP: A man walks past an employees entrance sign outside the U.S. Office of Personnel Management (OPM). ABOVE: OPMDirecto­r Katherine Archuleta testifies Tuesday on the cyberattac­k.

Newspapers in English

Newspapers from United States