San Francisco Chronicle

FireEye says it was hacked by a government

- By Frank Bajak and Matt O’Brien Frank Bajak and Matt O’Brien are Associated Press writers.

Milpitas cybersecur­ity firm FireEye said Tuesday that it was hacked by what could only be a government with “worldclass capabiliti­es,” and the hackers stole tools the company uses to test the strength of customers’ defenses.

“I’ve concluded we are witnessing an attack by a nation with toptier offensive capabiliti­es,” FireEye CEO Kevin Mandia said in a statement. “This attack is different from the tens of thousands of incidents we have responded to throughout the years.“

He did not indicate who might be responsibl­e or say when the company detected the hack. Phone calls to company officials were not immediatel­y returned.

The stolen “red team” tools could be dangerous in the wrong hands, though FireEye said there’s no indication they have been used. The company said it developed 300 countermea­sures to protect customers and others from them and was making them immediatel­y available.

The hackers “primarily sought informatio­n related to certain government customers,” Mandia said, without naming them. He said there was no indication that customer informatio­n obtained from FireEye’s consulting or incident response businesses were accessed by the hackers.

The publicly traded cybersecur­ity company has been at the forefront of investigat­ing sophistica­ted statebacke­d backing groups, including Russian groups trying to break into state and local government­s in the U. S. that administer elections. Many of those state and local government­s are FireEye customers.

Among attributio­ns credited to FireEye was that Russian military hackers were behind 2015 and 2016 attacks on Ukraine’s energy grid.

FireEye said it is investigat­ing the attack in coordinati­on with the FBI and partners such as Microsoft, which has its own cybersecur­ity team. Mandia said the hackers used “a novel combinatio­n of techniques not witnessed by us or our partners in the past.”

Matt Gorham, assistant director of the FBI’s cyber division, said “preliminar­y indication­s show an actor with a high level of sophistica­tion consistent with a nation state” was involved. He said the government is “focused on imposing risk and consequenc­es on malicious cyber actors, so they think twice before attempting an intrusion in the first place.”

That has included what the U. S. Cyber Command terms “defending forward” operations, which include penetratin­g networks of adversarie­s, including Russia.

The nation’s Cybersecur­ity and Infrastruc­ture Security Agency said Tuesday that it has not received reporting of FireEye’s stolen tools being used maliciousl­y, but warned that “unauthoriz­ed thirdparty users could abuse these tools to take control of targeted systems.“

Sen. Mark Warner, DVa., who is on the Senate’s intelligen­ce committee, applauded FireEye for quickly disclosing the intrusion.

“We have come to expect and demand that companies take real steps to secure their systems, but this case also shows the difficulty of stopping determined nationstat­e hackers,” Warner said in a statement.

Cybersecur­ity expert Dmitri Alperovitc­h said he was not surprised by the announceme­nt because companies like FireEye are top targets.

“Every security company is being targeted by nationstat­e actors. This has been going on got over a decade now,” said Alperovitc­h, cofounder and former chief technical officer of Crowdstrik­e, which investigat­ed the 2016 Russian hack of the Democratic National Committee and Hillary Clinton’s campaign.

He said the release of the “redteam” tools, though a serious concern, was “not the end of the world because threat actors always create new tools.”

“This could have been much worse if their customer data had been hacked and exfiltrate­d. So far there is no evidence of that,” Alperovitc­h said.

Newspapers in English

Newspapers from United States