The Oklahoman

FireEye CEO: Reckless Microsoft hack unusual for China

- By Frank Bajak and Nathan Ellgren

REST ON, Va.—Cy ber sleuths have already blamed China for a hack that exposed tens of thousands of servers running i ts Exchange email program to potential hacks. The CEO of a prominent cy ber security firm says it now seems clear China also unleashed an indiscrimi­nate, automated second wave of hacking that opened the way for ransom ware and other cyberattac­ks.

The second wave, which began Feb .26, is highly uncharacte­ristic of Beijing's elite cy ber spies and far exceeds the norms of espionage, said Kevin Mandia of FireEye. In its massive scale it diverges radical ly from the highly targeted nature of the original hack, which was detected in January.

“You never want to see a modern nation like China that has an offense capability — that they usually control with discipline — suddenly hit potentiall­y a hundred thousand systems,” Mandia said Tuesday in an interview with The Associated Press.

Mandia said his company assesses based on the forensics that two groups of Chinese state-backed hackers — in an explosion of automated seedin g—installed back doors known as “web shells” on an as-yet undetermin­ed number of s ystems. Experts f ear a large number could easily be exploited for second- stage infections of ransomware by criminals, who also use automation to identify and infect targets.

Across the globe, cybersecur­ity teams are scrambling to identify and shore up hacked systems. The National Governors Associatio­n sent a rare alert to governor son Tuesday asking them amplify “both the severity of the threat and the next steps” local government­s, businesses and operators of critical infrastruc­ture should take.

David Kennedy, CEO of the cybersecur­ity firm Trusted Sec, tweeted Tuesday that resource-demanding programs that “mi ne” cryp to currencies were being installed on some compromise­d Exchange servers.

The White House has called the overall hack an “active threat,” but so far has not urged tough action against China or differenti­ated between the two waves — at least not publicly. Neither the White House nor the Department of Homeland Security offered immediate comment on whether they attribute the second wave to China.

The assessment of Mandia, who has been dealing with Chinese statebacke­d hackers since 1995 and has long had the ear of presidents and prime ministers, squares with that of Dmitri Alperovitc­h, former chief technical officer of CrowdStrik­e, the other cybersecur­ity powerhouse in the Washington, D.C., area. Alperovitc­h says China needs to be immediatel­y put on notice: Shut down those web shell implants and limit collateral.

The explosion of automated backdoor-creating hacks began five days before Microsoft issued a patch for the vulnerabil­ities first detected in late January by the cybersecur­ity firm Volexity. It had found evidence of the vulnerabil­ities being used as far back as Jan. 3 by Chinese state-backed hackers, who researcher­s say targeted think tanks, universiti­es, defense contractor­s, law firms and infectious­disease research centers.

Suddenly, all manner of organizati­ons that run email servers were infected with web shells associated with known Chinese groups, who — knowing the patch was imminent — rushed to hit everything they could, said Mandia.

“They could sense it was going to end-of-life soon, so they just went wild. They machine gun-fired down the stretch,” he said in an interview in FireEye's offices.

It's possible the second infection wave was not approved at the highest levels of China's government,” Mandia said.

“This doesn't feel consistent with what they normally do,” he said. “A lot of times there's a disconnect between senior leadership and frontline folks. All I can tell you is it was surprising to me to see four `zero days' wantonly exploited,” adding, “If you could be exploited by this act, for the most part, you were.”

“Zero days” are vulnerabil­ities that hackers discover and use to pry open secret doors in software. Their name derives from the countdown to patching that begins after they are deployed. In this case, it took Microsoft 28 days to produce a patch once it was notified.

Mandia cautioned that the mass hack is not apt to trigger any critical infrastruc­ture failures or cost lives. “It's not going to draw blood.” But it highlights how there are no rules of engagement in cyberspace, something government­s urgently need to address “before something catastroph­ic happens.”

Asked for comment on Monday about allegation­s it was behind the hack, the Chinese Embassy in Washington pointed to remarks last week from Foreign Ministry spokespers­on Wang Wenbin saying that China “firmly opposes and combats cyber attacks and cyber theft in all forms.” He said attributio­n of cyberattac­ks should be based on evidence and not “groundless accusation­s.”

Mandia compared the Exchange hack with the SolarWinds hacking campaign that Washington has blamed on elite Russian intelligen­ce agents that his company discovered in December.

“The SolarWinds attack was very surreptiti­ous, very stealthy, very focused. The operator showed restraint and they went deep not wide,” said Mandia, who appeared in multiple Capitol Hill hearings on SolarWinds. “This attack (Exchange) feels very wide, but what I don't have an answer to yet is just how deep it is.”

U.S. officials say at least nine federal agencies and over 100 private sector targets were affected by the Solar Winds campaign, named after the Texas company whose network management software was used to seed mal ware to more than 18,000 customers. Only a small number were hacked during the campaign, which went eight months without being detected.

Newspapers in English

Newspapers from United States