San Francisco Chronicle - (Sunday)

Cybersecur­ity firm: Booting hackers hard

- By Frank Bajak By Frank Bajak is an Associated Press writer.

“There’s a lot of specific things you have to do ... to really eradicate the attacker.”

Efforts to assess the impact of a more than sevenmonth­old cyberespio­nage campaign blamed on Russia — and boot the intruders — remain in their early stages, says the cybersecur­ity firm that discovered the attack.

The hack has badly shaken the U.S. government and private sector. The firm, FireEye, based in Milipitas, released a tool and a white paper Tuesday to help potential victims scour their cloudbased installati­ons of Microsoft 365 — where users’ emails, documents and collaborat­ive tools reside — to determine if hackers broke in and remain active.

The aim is not just to ferret out and evict the hackers but to keep them from being able to reenter, said Matthew McWhirt, the effort’s team leader.

“There’s a lot of specific things you have to do — we learned from our investigat­ions — to really eradicate the attacker,” he said.

Since FireEye disclosed its discovery in midDecembe­r, infections have been found at federal agencies including the department­s of Commerce, Treasury, Justice and federal courts. Also compromise­d, said FireEye chief technical officer Charles Carmakal, are dozens of private sector targets with a high concentrat­ion in the software industry and Washington D.C. policyorie­nted think tanks.

On Tuesday, the security software company Malwarebyt­es announced that it was among the victims — and said it was compromise­d through the very Microsoft email system the FireEye tool aims to button down.

The intruders have stealthily scooped up intelligen­ce for months, carefully choosing targets from the roughly 18,000 customers infected with malicious code they activated after sneaking it into an update of network management software first pushed out last March by Texasbased SolarWinds.

“We continue to learn about new victims almost every day. I still think that we’re still in the early days of really understand­ing the scope of the threatacto­r activity,” said Carmakal.

During a Senate confirmati­on hearing on Tuesday, national intelligen­ce director nominee Avril Haines said she’s not yet been fully briefed on the campaign but noted that the Department of Homeland Security has deemed it “a grave risk” to government systems, critical infrastruc­ture and the private sector and “it does seem to be extraordin­ary in its nature and its scope.”

The public has not heard much about who exactly was compromise­d because many victims still can’t figure out what the attackers have done and thus “may not feel they have an obligation to report on it,” said Carmakal.

“This threat actor is so good, so sophistica­ted, so discipline­d, so patient and so elusive that it’s just hard for organizati­ons to really understand what the scope and impact of the intrusions are. But I can assure you there are a lot of victims beyond what has been made public to date,” Carmakal said.

On top of that, he said, the hackers “will continue to obtain access to organizati­ons. There will be new victims.”

Microsoft disclosed on Dec. 31 t hat the hackers had viewed some of its source code. It said it found “no indication­s our systems were used to attack others.” On Tuesday, Malwarebyt­es said it had determined that “the attacker only gained access to a limited subset of internal company emails” and said the conduit — Microsoft’s Azure cloud services — are not used in its software production environmen­ts.

Carmakal said he believed software companies were prime targets because hackers of this caliber will seek to use their products — as they did with SolarWinds’ Orion module — as conduits for similar socalled supplychai­n hacks.

The hackers’ programmin­g acumen let them forge the digital passports — known as certificat­es and tokens — needed to move around targets’ Microsoft 365 installati­ons without logging in and authentica­ting identity. It’s like a ghost hijacking, very difficult to detect.

They tended to zero in on two types of accounts, said Carmakal: Users with access to highvalue informatio­n and highlevel network administra­tors, to determine what measures were being taken to try to kick them out,

If it’s a software company, the hackers will want to examine the data repositori­es of top engineers. If it’s a government agency, corporatio­n or think tank, they’ll seek access to emails and documents with national security and trade secrets and other vital intelligen­ce.

 ??  ??
 ?? Ben Margot / Associated Press 2005 ?? FireEye in Milpitas discovered the cyberespio­nage attacks at government agencies.
Ben Margot / Associated Press 2005 FireEye in Milpitas discovered the cyberespio­nage attacks at government agencies.
 ?? Jenny Kane / Associated Press 2019 ?? FireEye has released a tool to help victims check their cloudbased Microsoft 365 computer installati­ons for hacking.
Jenny Kane / Associated Press 2019 FireEye has released a tool to help victims check their cloudbased Microsoft 365 computer installati­ons for hacking.
 ??  ??
 ??  ??

Newspapers in English

Newspapers from United States