![]() “This is like doing heart surgery, to pull this out of a lot of environments,” said Edward Amoroso, CEO of TAG Cyber. government clients are rich with generals and spymasters.Įxtracting the suspected Russian hackers’ tool kits from victims is exacerbated by the complexity of SolarWinds’ platform with its dozen different components. SolarWinds’ customers include most prominent Fortune 500 companies, and it’s U.S. FireEye says it has identified dozens, all “high-value targets.” Microsoft, which has helped respond, says it has identified more than 40 government agencies, think tanks, government contractors, non-governmental organizations and technology companies infiltrated by the hackers, 80% of them in the United States. Only a sliver of those infections were activated. What makes this hacking campaign so extraordinary is its scale - 18,000 organizations were infected from March to June by malicious code that piggybacked on popular network-management software from an Austin, Texas, company called SolarWinds. adversaries, national security experts said. There is little incentive for the White House to disclose which agencies were hacked. But Morgenstern said he has been briefed. President Donald Trump, who has downplayed the Russian cyberthreat after refusing to accept that a Kremlin hack-and-leak operation favored him in the 2016 election, has said nothing publicly about the SolarWinds attack. He would not provide details, “but rest assured we have the best and brightest working hard on it each and every single day.” How do you get work done? You kind of just hope for the best,” he said.ĭeputy White House press secretary Brian Morgenstern told reporters Friday that national security adviser Robert O’Brien has sometimes been leading multiple daily meetings with the FBI, the Department of Homeland Security and the intelligence community, looking for ways to mitigate the hack. Imagine a computer network as a mansion you inhabit, and you are certain a serial killer as been there. It’s the only way to be sure an intruder is out. The only way to be sure a network is clean is “to burn it down to the ground and rebuild it,” Schneier said. ![]() This will be a long ride,” said Dmitri Alperovitch, co-founder and former chief technical officer of the leading cybersecurity firm CrowdStrike. ![]() Agencies will often have to conduct sensitive government business on Signal, WhatsApp and other encrypted smartphone apps. That means many federal workers - and others in the private sector - will have to presume that unclassified networks are teeming with spies. It’s not known exactly what the hackers were seeking, but experts say it could include nuclear secrets, blueprints for advanced weaponry and information for dossiers on key government and industry leaders.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |