Is This The Hack Of The Decade?

Microsoft was hacked as part of the suspected Russian campaign that has hit multiple US government agencies by taking advantage of the widespread use of software from SolarWinds Corp.

As with the networking management software by SolarWinds, Microsoft’s own products were then used to further the attacks on others, in what some are calling the biggest hack in a decade.

It is not yet certain how many Microsoft users were affected by the tainted products and  US Department of Homeland Security (DHS) says that the hackers used multiple methods of entry and is investigating the massive hack against the US government, which included  malicious computer code sent to Microsoft

Microsoft is a customer of SolarWinds, the IT provider the hackers used to send software updates to numerous US government agencies. Microsoft says it neutralised the infection before any major damage was done. “We have been actively looking for indicators of this actor and can confirm that we detected malicious SolarWinds binaries in our environment, which we isolated and removed,” the company said in a statement. Microsoft added: “We have not found evidence of access to production services or customer data. Our investigations, which are ongoing, have found absolutely no indications that our systems were used to attack others.”

The hack, which is being blamed on Russia, infiltrated federal agencies, including homeland security and nuclear programs. Microsoft and other companies are also affected.

Microsoft  is a user of Orion, the widely deployed networking management software from SolarWinds Corp which was used in the suspected Russian attacks on vital U.S. agencies and  the US National Security Agency (NSA) issued a rare "cybersecurity advisory"  detailing how certain Microsoft Azure cloud services may have been compromised by hackers and directing users to lock down their systems.

SolarWinds sells software that lets an organization see what's happening on its computer networks. Hackers inserted malicious code into an updated version of the software, called Orion. Around 18,000 SolarWinds customers in stalled the tainted updates onto their systems, the company said. One of the people familiar with the hacking spree said the hackers made use of Microsoft cloud offerings while avoiding Microsoft's corporate infrastructure.

The DHS said the hackers had used other techniques besides corrupting updates of network management software by SolarWinds which is used by hundreds of thousands of companies and government agencies. According to sources, the DHS does not believe Microsoft was a major source of infection and  the hackers appear to have used multiple methods of entry. 

The US Energy Department said it has evidence hackers gained access to its networks as part of the campaign.and the National Nuclear Security Administration (NNSA), which manages the country's nuclear weapons stockpile, was also targeted. An Energy Department spokeswoman said malware "has been isolated to business networks only" and has not impacted U.S. national security, including the NNSA.

The US Cyber Security and Infrastructure Security Agency (CISA) has urged investigators not to assume their organisations were safe if they did not use recent versions of the SolarWinds software. CISA said it was continuing to analyse the other avenues used by the attackers.

Since the campaign was discovered, software companies have cut off communication from those back doors to the computers maintained by the hackers, but an obvious concern is that the attackers might have installed additional ways of maintaining access

The Department of Justice, the FBI and Defense Department have moved routine communication onto classified networks that are believed not to have been breached on the assumption that the non-classified networks have been compromised. But the attackers are very careful and have deleted logs which would reveal the electronic fingerprints about which files they have accessed. That makes it hard to know what has been taken and some major companies have said they have "no evidence" that they were penetrated, but that may only be because the evidence was removed.

In most networks, the attackers would also have been able to create false data, but so far it appears they were interested only in obtaining real data, it is reported bu those familiar with the investigation.

Meanwhile, members of the US Congress are demanding more information about what may have been taken and who was behind it. The House Homeland Security Committee and Oversight Committee announced an investigation, while senators pressed to learn whether individual tax information was obtained.

In a statement, President-elect Joe Biden said he would "elevate cybersecurity as an imperative across the government" and "disrupt and deter our adversaries" from undertaking such major hacks.

Reuters:    Reuters:       PCMag:      CNet:      Channel News Asia

You Might Also Read: 

Microsoft & Intel Agree To Fight Malware:

 

« Major Cyber Attack On US Government Agencies Blamed On Russia
How to Close the Global Cybersecurity Skills Gap: Two Easy Steps »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

StartupXseed Ventures

StartupXseed Ventures

StartupXseed Ventures is a smart capital provider for Deep Tech, B2B, Early Stage Startups. We support, NextGen Tech Entrepreneurs, who have potential to deliver the outsized growth.

Presidio

Presidio

Presidio is a leading North American IT solutions provider focused on Digital Infrastructure, Business Analytics, Cloud, Security & Emerging solutions.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

DartPoints

DartPoints

DartPoints helps bridge the digital divide by delivering cloud, colocation, managed services + edge infrastructure.

Eleos Labs

Eleos Labs

Eleos Labs' suite of security tools prevent Web3 cyber attacks, reduce economic risks, and protect digital assets.

DerSecur

DerSecur

DerSecur has been engaged in advanced technology activities in the field of Application Security since 2011. We offer R&D technology solutions in the field of SAST, DAST and SCA analysis.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.