Is This The Hack Of The Decade?

Microsoft was hacked as part of the suspected Russian campaign that has hit multiple US government agencies by taking advantage of the widespread use of software from SolarWinds Corp.

As with the networking management software by SolarWinds, Microsoft’s own products were then used to further the attacks on others, in what some are calling the biggest hack in a decade.

It is not yet certain how many Microsoft users were affected by the tainted products and  US Department of Homeland Security (DHS) says that the hackers used multiple methods of entry and is investigating the massive hack against the US government, which included  malicious computer code sent to Microsoft

Microsoft is a customer of SolarWinds, the IT provider the hackers used to send software updates to numerous US government agencies. Microsoft says it neutralised the infection before any major damage was done. “We have been actively looking for indicators of this actor and can confirm that we detected malicious SolarWinds binaries in our environment, which we isolated and removed,” the company said in a statement. Microsoft added: “We have not found evidence of access to production services or customer data. Our investigations, which are ongoing, have found absolutely no indications that our systems were used to attack others.”

The hack, which is being blamed on Russia, infiltrated federal agencies, including homeland security and nuclear programs. Microsoft and other companies are also affected.

Microsoft  is a user of Orion, the widely deployed networking management software from SolarWinds Corp which was used in the suspected Russian attacks on vital U.S. agencies and  the US National Security Agency (NSA) issued a rare "cybersecurity advisory"  detailing how certain Microsoft Azure cloud services may have been compromised by hackers and directing users to lock down their systems.

SolarWinds sells software that lets an organization see what's happening on its computer networks. Hackers inserted malicious code into an updated version of the software, called Orion. Around 18,000 SolarWinds customers in stalled the tainted updates onto their systems, the company said. One of the people familiar with the hacking spree said the hackers made use of Microsoft cloud offerings while avoiding Microsoft's corporate infrastructure.

The DHS said the hackers had used other techniques besides corrupting updates of network management software by SolarWinds which is used by hundreds of thousands of companies and government agencies. According to sources, the DHS does not believe Microsoft was a major source of infection and  the hackers appear to have used multiple methods of entry. 

The US Energy Department said it has evidence hackers gained access to its networks as part of the campaign.and the National Nuclear Security Administration (NNSA), which manages the country's nuclear weapons stockpile, was also targeted. An Energy Department spokeswoman said malware "has been isolated to business networks only" and has not impacted U.S. national security, including the NNSA.

The US Cyber Security and Infrastructure Security Agency (CISA) has urged investigators not to assume their organisations were safe if they did not use recent versions of the SolarWinds software. CISA said it was continuing to analyse the other avenues used by the attackers.

Since the campaign was discovered, software companies have cut off communication from those back doors to the computers maintained by the hackers, but an obvious concern is that the attackers might have installed additional ways of maintaining access

The Department of Justice, the FBI and Defense Department have moved routine communication onto classified networks that are believed not to have been breached on the assumption that the non-classified networks have been compromised. But the attackers are very careful and have deleted logs which would reveal the electronic fingerprints about which files they have accessed. That makes it hard to know what has been taken and some major companies have said they have "no evidence" that they were penetrated, but that may only be because the evidence was removed.

In most networks, the attackers would also have been able to create false data, but so far it appears they were interested only in obtaining real data, it is reported bu those familiar with the investigation.

Meanwhile, members of the US Congress are demanding more information about what may have been taken and who was behind it. The House Homeland Security Committee and Oversight Committee announced an investigation, while senators pressed to learn whether individual tax information was obtained.

In a statement, President-elect Joe Biden said he would "elevate cybersecurity as an imperative across the government" and "disrupt and deter our adversaries" from undertaking such major hacks.

Reuters:    Reuters:       PCMag:      CNet:      Channel News Asia

You Might Also Read: 

Microsoft & Intel Agree To Fight Malware:

 

« Major Cyber Attack On US Government Agencies Blamed On Russia
How to Close the Global Cybersecurity Skills Gap: Two Easy Steps »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

DFLabs

DFLabs

DFlabs is a pioneer in Security Automation & Orchestration technology, leveraging your existing security products to dramatically reduce the response and remediation gap.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

Griffiss Institute (GI)

Griffiss Institute (GI)

GI's primary role is to advocate and facilitate the co-operation of private industry, academia, and the Air Force Research Laboratory in developing solutions to critical cyber security problems.

CyberKnight Technologies

CyberKnight Technologies

CyberKnight Technologies is a cybersecurity focused value-added-distributor (VAD) headquartered in Dubai and covering the Middle East.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

AUCloud

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.