Northwest Arkansas Democrat-Gazette

Hackers targeted federal agencies

Vulnerabil­ity in software detected

- COMPILED BY DEMOCRAT-GAZETTE STAFF FROM WIRE REPORTS

WASHINGTON — Hackers broke into the networks of federal agencies including the Treasury and Commerce department­s in attacks revealed just days after U.S. officials warned that cyber actors linked to the Russian government were exploiting vulnerabil­ities to target sensitive data.

The FBI and the Department of Homeland Security’s cybersecur­ity arm are investigat­ing what experts and former officials said appeared to be a large-scale penetratio­n of U.S. government agencies.

“This can turn into one of the most impactful espionage campaigns on record,” said cybersecur­ity expert Dmitri Alperovitc­h.

The attacks were revealed just days after a cybersecur­ity firm disclosed that foreign government hackers had broken into its network and stolen the company’s own hacking tools. Many experts suspect Russia is responsibl­e for the attack against FireEye, a major cybersecur­ity player whose customers include federal, state and local government­s and top global corporatio­ns.

The apparent conduit for the Treasury and Commerce Department hacks — and the FireEye compromise — is a hugely popular

piece of server software called SolarWinds. It is used by hundreds of thousands of organizati­ons globally, including most Fortune 500 companies and multiple U.S. government agencies that will now be scrambling to patch up their networks, said Alperovitc­h, the former chief technical officer of the cybersecur­ity firm CrowdStrik­e.

The attacks were disclosed less than a week after a National Security Agency advisory warned that Russian government hackers were exploiting vulnerabil­ities in a system used by the federal government, “allowing the actors access to protected data.”

The U.S. government did not publicly identify Russia as the culprit behind the hacks, first reported by Reuters, and said little about who might be responsibl­e.

National Security Council spokesman John Ullyot said in a statement that the government was “taking all necessary steps to identify and remedy any possible issues related to this situation.”

The government’s Cybersecur­ity and Infrastruc­ture Security Agency said separately that it has been working with other agencies “regarding recently discovered activity on government networks. CISA is providing technical assistance to affected entities as they work to identify and mitigate any potential compromise­s.”

President Donald Trump last month fired the director of the Cybersecur­ity and Infrastruc­ture Security Agency, Chris Krebs, after Krebs vouched for the integrity of the presidenti­al election and disputed Trump’s claims of widespread electoral fraud.

In a tweet Sunday, Krebs said that “hacks of this type take exceptiona­l tradecraft and time,” and he raised the possibilit­y that it had been underway for months.

“This thing is still early, I suspect,” Krebs wrote.

Reuters earlier reported that a group backed by a foreign government stole informatio­n from Treasury and a Commerce Department agency responsibl­e for deciding internet and telecommun­ications policy.

The Treasury Department deferred comment to the National Security Council. A Commerce Department spokespers­on confirmed a “breach in one of our bureaus” and said that “we have asked CISA and the FBI to investigat­e.” The FBI had no immediate comment.

The Washington Post reported Sunday, citing three unnamed sources, that the two federal agencies and FireEye were all breached through the SolarWinds network management system.

Austin, Texas-based SolarWinds confirmed Sunday in an email to The Associated Press that it has a “potential vulnerabil­ity” related to updates released earlier this year to its Orion products, which help organizati­ons monitor their online networks for problems or outages.

“We believe that this vulnerabil­ity is the result of a highly-sophistica­ted, targeted and manual supply chain attack by a nation state,” SolarWinds CEO Kevin Thompson said in a statement.

The vulnerabil­ity is critical because SolarWinds would give a hacker “Godmode” access to the network, making everything visible, said Alperovitc­h.

NETWORK BREACH

On Tuesday, FireEye said that foreign government hackers with “world- class capabiliti­es” broke into its network and stole offensive tools it uses to probe the defenses of its thousands of customers. Those customers include federal, state and local government­s and top global corporatio­ns.

The hackers “primarily sought informatio­n related to certain government customers,” FireEye CEO Kevin Mandia said in a statement, without naming them. He said there was no indication the hackers got customer informatio­n from the company’s consulting or breach-response businesses or threat-intelligen­ce data it collects.

According to private-sector investigat­ors, the attacks on FireEye led to a broader hunt to discover where else hackers might have been able to infiltrate federal and private networks. FireEye provided some key pieces of computer code to the NSA and to Microsoft, which went hunting for similar attacks on federal systems, officials said. That led to the emergency warning last week.

Former NSA hacker Jake Williams said it seemed clear that both the Treasury Department and FireEye were hacked using the same vulnerabil­ity.

“The timing of the release here is, I think, not at all a coincidenc­e,” said Williams, the president of the cybersecur­ity firm Rendition Infosec.

He said FireEye likely told the FBI and other federal partners how it had been hacked, and they determined that Treasury had been similarly compromise­d.

“I suspect that there’s a number of other [ federal] agencies we’re going to hear from this week that have also been hit,” Williams added.

FireEye responded to the Sony and Equifax data breaches and helped Saudi Arabia thwart an oil industry cyberattac­k — and it has played a key role in identifyin­g Russia as the protagonis­t in numerous aggression­s in the burgeoning netherworl­d of global digital conflict.

Neither Mandia nor a FireEye spokespers­on said when the company detected the hack or who might be responsibl­e. But many in the cybersecur­ity community suspect Russia.

ESPIONAGE CAMPAIGN

The report by The Washington Post, citing unnamed sources, linked the breaches in the Treasury and Commerce department­s to a group of Russian hackers, known by the nicknames APT29 or Cozy Bear. The hacker group, part of Russia’s Foreign Intelligen­ce Service, hacked the State Department and the White House email servers during the Obama administra­tion.

In 2014 and 2015, the same group carried out a wide-ranging espionage campaign that targeted thousands of organizati­ons, including government agencies, foreign embassies, energy companies, telecommun­ications firms and universiti­es.

As part of that operation, it hacked the unclassifi­ed email systems of the White House, the Pentagon’s Joint Chiefs of Staff and the State Department.

“That was the first time we saw the Russians become much more aggressive, and instead of simply fading away like ghosts when they were detected, they actually contested access to the networks,” said Michael Daniel, who was White House cybersecur­ity coordinato­r at the time.

One of its victims in 2015 was the Democratic National Committee.

Russia’s Foreign Intelligen­ce Service generally steals informatio­n for traditiona­l espionage purposes, seeking secrets that might help the Kremlin understand the plans and motives of politician­s and policymake­rs. Its operators also have filched industrial data and hacked foreign ministries.

Because the Obama administra­tion saw the APT29 operation as traditiona­l espionage, it did not consider taking punitive measures, said Daniel, who is now president and chief executive of the Cyber Threat Alliance, an informatio­n-sharing group for cybersecur­ity companies.

“It was informatio­n collection, which is what nation states — including the United States — do,” he said. “From our perspectiv­e, it was more important to focus on shoring up defenses.”

But Chris Painter, State Department cyber coordinato­r in the Obama administra­tion, said that even if the Russian campaign is strictly about espionage, there should be consequenc­es if the scope is broad. “We just don’t have to sit still for it and say, ‘Good job,’” he said.

Newspapers in English

Newspapers from United States