Get 40% Off
🚨 Volatile Markets? Find Hidden Gems for Serious OutperformanceFind Stocks Now

Hackers' broad attack sets cyber experts worldwide scrambling to defend networks

Published 12/18/2020, 03:19 PM
Updated 12/19/2020, 12:10 AM
© Reuters. FILE PHOTO: Exterior view of SolarWinds headquarters in Austin

By Jack Stubbs

(Reuters) -Suspected Russian hackers who broke into U.S. government agencies also spied on less high-profile organizations, including groups in Britain, a U.S. internet provider and a county government in Arizona, according to web records and a security source.

More details were revealed on Friday of the cyber espionage campaign that has computer network security teams worldwide scrambling to limit the damage as a senior official in the outgoing administration of U.S. President Donald Trump explicitly acknowledged Russia's role in the hack for the first time.

Secretary of State Mike Pompeo said on the Mark Levin radio show "I think it's the case that now we can say pretty clearly that it was the Russians that engaged in this activity."

Networking gear maker Cisco Systems Inc (NASDAQ:CSCO) said a limited number of machines in some of its labs had been found with malicious software on them, without saying if anything had been taken. A person familiar with the company's ongoing probe said fewer than 50 were compromised.

In Britain, a small number of organizations were compromised and not in the public sector, a security source said.

Shares in cyber security companies FireEye (NASDAQ:FEYE) Inc, Palo Alto Networks (NYSE:PANW) and Crowdstrike Holdings rose on Friday as investors bet that the spate of disclosures from Microsoft Corp (NASDAQ:MSFT) and others would boost demand for security technology.

Reuters identified Cox Communications Inc and Pima County, Arizona government as victims of the intrusion by running a publicly available coding script https://securelist.com/sunburst-connecting-the-dots-in-the-dns-requests/99862/?enowpopup from researchers at Moscow-based private cybersecurity firm Kaspersky. The hack hijacked ubiquitous network management software made by SolarWinds Corp. Kaspersky decrypted online web records left behind by the attackers.

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

The breaches of U.S. government agencies, first revealed by Reuters on Sunday, hit the Department of Homeland Security, the Treasury Department, State Department and Department of Energy. In some cases the breaches involved monitoring emails but it was unclear what hackers did while infiltrating networks, cybersecurity experts said.

Trump has not said anything publicly about the intrusion. He was being briefed "as needed," White House spokesman Brian Morgenstern told reporters. National security adviser Robert O'Brien was leading interagency meetings daily, if not more often, he said.

"They're working very hard on mitigation and making sure that our country is secure. We will not get into too many details because we're just not going to tell our adversaries what we do to combat these things," Morgenstern said.

No determinations have been made on how to respond or who was responsible, a senior U.S. official said.

SolarWinds, which disclosed its unwitting role at the center of the global hack on Monday, has said that up to 18,000 users of its Orion software downloaded a compromised update containing malicious code planted by the attackers. The attack was believed to be the work of an "outside nation state," SolarWinds said in a regulatory disclosure.

People familiar with the matter have said the hackers were believed to be working for the Russian government. Kremlin spokesman Dmitry Peskov dismissed the allegations.

On Friday, U.S. Representative Stephen Lynch, head of the House of Representatives Committee on Oversight and Reform panel's national security subcommittee, said the information provided by the Trump administration was "very disappointing."

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

"This hack was so big in scope that even our cybersecurity experts don't have a real sense yet in terms of the breadth of the intrusion itself," adding that it would take some time to fully vet all the agencies and targets.

The breach appeared to provide President-elect Joe Biden with an immediate headache when he takes office on Jan. 20. His transition team's executive director Yohannes Abraham told reporters on Friday there would be "substantial costs" and the incoming administration "will reserve the right to respond at a time and in a manner of our choosing, often in close coordination with our allies and partners."

Microsoft, one of the thousands of companies to receive the malicious update, said it had notified more than 40 customers whose networks were further infiltrated by the hackers.

Around 30 of those customers were in the United States, Microsoft said, with the remaining victims found in Canada, Mexico, Belgium, Spain, Britain, Israel and the United Arab Emirates. Most worked with information technology companies, some think tanks and government organizations.

Latest comments

Man the contract writers for those cyber security stocks got crushed.
These are acts of war, and should be dealt with as such.
Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.