Get 40% Off
👀 👁 🧿 All eyes on Biogen, up +4,56% after posting earnings. Our AI picked it in March 2024.
Which stocks will surge next?
Unlock AI-picked Stocks

U.S. Homeland Security, thousands of businesses scramble after suspected Russian hack

Published 12/14/2020, 11:35 AM
Updated 12/14/2020, 07:40 PM
© Reuters. FILE PHOTO: Hooded man holds a laptop computer as cyber code is projected on him in this illustration picture

By Jack Stubbs, Raphael Satter and Joseph Menn

LONDON/WASHINGTON (Reuters) -The U.S. Department of Homeland Security and thousands of businesses scrambled Monday to investigate and respond to a sweeping hacking campaign that officials suspect was directed by the Russian government.

Emails sent by officials at DHS, which oversees border security and defense against hacking, were monitored by the hackers as part of the sophisticated series of breaches, three people familiar with the matter told Reuters Monday.

The attacks, first revealed Sunday, also hit the U.S. departments of Treasury and Commerce.

Technology company SolarWinds, which was the key steppingstone used by the hackers, said up to 18,000 of its customers had downloaded a compromised software update that allowed hackers to spy unnoticed on businesses and agencies for almost nine months.

The United States issued an emergency warning on Sunday, ordering government users to disconnect SolarWinds software which it said had been compromised by "malicious actors."

That warning came after Reuters reported suspected Russian hackers had used hijacked SolarWinds software updates to break into multiple American government agencies, including the Treasury and Commerce departments. Moscow denied having any connection to the attacks.

One of the people familiar with the hacking campaign said the critical network that DHS' cybersecurity division uses to protect infrastructure, including the recent elections, had not been breached.

DHS said it was aware of the reports, without directly confirming them or saying how badly it was affected.

DHS is a massive bureaucracy among other things responsible for securing the distribution of the COVID-19 vaccine.

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

The cybersecurity unit there, known as CISA, has been upended by President Donald Trump's firing of head Chris Krebs after Krebs called the presidential election the most secure in American history. His deputy and the elections chief have also left.

The Pentagon said on Monday it is aware of the reports but was not able to comment on "specific mitigation measures or specify systems that may have been impacted."

The National Security Agency and Joint Force Headquarters Commanders issued guidance and directives to protect DoD networks and IT systems.

SolarWinds said in a regulatory disclosure it believed the attack was the work of an "outside nation state" that inserted malicious code into updates of its Orion network management software issued between March and June this year.

"SolarWinds currently believes the actual number of customers that may have had an installation of the Orion products that contained this vulnerability to be fewer than 18,000," it said.

The company did not respond to requests for comment about the exact number of compromised customers or the extent of any breaches at those organisations.

It said it was not aware of vulnerabilities in any of its other products and it was now investigating with help from U.S. law enforcement and outside cybersecurity experts.

SolarWinds boasts 300,000 customers globally, including the majority of the United States' Fortune 500 companies and some of the most sensitive parts of the U.S. and British governments - such as the White House, defence departments and both countries' signals intelligence agencies.

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

Investigators around the world are now scrambling to find out who was hit.

A British government spokesman said the United Kingdom was not currently aware of any impact from the hack but was still investigating.

Three people familiar with the investigation into the hack told Reuters that any organisation running a compromised version of the Orion software would have had a "backdoor" installed in their computer systems by the attackers.

"After that, it's just a question of whether the attackers decide to exploit that access further," said one of the sources.

Early indications suggest that the hackers were discriminating about who they chose to break into, according to two people familiar with the wave of corporate cybersecurity investigations being launched Monday morning.

"What we see is far fewer than all the possibilities," said one person. "They are using this like a scalpel."

FireEye (NASDAQ:FEYE), a prominent cybersecurity company that was breached in connection with the incident, said in a blog post that other targets included "government, consulting, technology, telecom and extractive entities in North America, Europe, Asia and the Middle East."

"If it is cyber espionage, then it one of the most effective cyber espionage campaigns we've seen in quite some time," said John Hultquist, FireEye's director of intelligence analysis.

Because the attackers could use SolarWinds to get inside a network and then create a new backdoor, merely disconnecting the network management program is not enough to boot the hackers out, experts said.

For that reason, thousands of customers are looking for signs of the hackers' presence and trying to hunt down and disable those extra tools.

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

Latest comments

splashback from Stuxnet. play with fire get burnt. it's open season now.
Customers looking for the hacks... in one way exactly?
Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.