Saturday, March 6, 2021

SolarWinds hack required massive, sophisticated effort, says Microsoft head

Microsoft, one of more than 100 companies attacked and 18,000 left vulnerable by the hack, has analysed the work it took to insert malware into widely used security software created by SolarWinds.

Other News

Kerajaan kaji langkah lindungi sektor komoditi hadapi cuaca panas

Pekebun kecil getah dan kelapa sawit sering terjejas ketika menghadapi musim panas.

205 warga asing ditahan imigresen di pangsapuri Pudu

Kesemua yang ditahan kemudiannya dibawa ke JIM di Kompleks Kementerian Dalam Negeri.

BN’s ‘chief media officer’ suspended, but does the post exist?

Barisan Nasional is said to be in damage control mode after the release of a statement nearly identical to another issued by Pakatan Harapan leader Anwar Ibrahim.

Ketua pegawai media BN digantung, tetapi apakah jawatan itu wujud?

Jawatan itu diwujudkan bagi melindungi presiden Umno yang menerima kritikan parti komponen BN.

Long-distance relationships in the age of the pandemic

A year since Covid-19 emerged as a global pandemic, binational couples kept apart by travel restrictions and border closures continue to hope for a reunion.

The stunning SolarWinds hack that cybersecurity experts blame on Russia likely took a massive, disciplined effort by more than 1,000 software engineers, Microsoft president Brad Smith said Tuesday.

Smith told a hearing of the Senate Intelligence Committee that no other body but Russian intelligence has the ability to muster such an effort, which he branded “reckless” in the breadth of its threat to the globe.

Microsoft, one of more than 100 companies attacked and 18,000 left vulnerable by the hack, analysed the work it took to insert malware into widely used security software created by SolarWinds.

“We asked ourselves how many engineers do we believe had worked on this collective effort. And the answer we came to was… at least 1,000, very skilled, capable engineers.

“We haven’t seen this kind of sophistication matched with this kind of scale,” he said.

Smith compared previous hacks from Russian- and other government-backed groups to a burglar breaking into a single apartment.

The SolarWinds incident was different, he said: it was like a burglar who “manages to turn off the alarm system for every home and every building in the entire city”.

“Everybody’s safety is put at risk. And that is what we’re grappling with here,” he said.

The hack was discovered by computer security firm FireEye in December after it had sat on computers around the world.

Among US government agencies penetrated were the National Security Agency, the State Department, Commerce Department and the Treasury.

The Washington Post reported Tuesday that the Biden administration was studying options to punish Moscow for the hack and for other “malign” activity.

Last week Anne Neuberger, the senior White House cybersecurity adviser, said her team was looking “holistically” at retaliation.

“This isn’t the only case of malicious cyber activity of likely Russian origin, either for us or for our allies and partners,” she said.

In the Senate hearing, FireEye chief executive Kevin Mandia described the hack as the culmination of a “multi-decade” effort by the attackers.

He said it took thousands of hours for his staff to discover the bug, and only after tearing apart and decompiling thousands of files on a SolarWinds server.

“This was not the first place you look, this was the last place you look for an insertion,” he said.

Sudhakar Ramakrishna, the chief executive of SolarWinds, said that after months the company still has not found how the hackers managed to implant malware in the middle of the software supply chain – at the point when completed code is being tailored to downstream users’ configurations.

“We understand the gravity of the situation,” he said.

In the hearing, both tech company officials and lawmakers said the breadth of the SolarWinds hack showed there needs to be a mandatory reporting system for companies discovering they have been penetrated by hackers.

While currently companies can voluntarily report to the cybersecurity officials of the Department of Homeland Security, some suggested a legal requirement that they do so, to catch future threats early.

“It seems to me that there should be an obligation of some sort on the part of a victim of a cyber attack like this to share what they know, what they’ve learned, with the appropriate authorities,” said Senator John Cornyn.

“There’s got to be a way for folks who are responding to breaches to share data quickly to protect the nation, protect industries,” said Mandia.

Follow us on Telegram for the latest updates:

Subscribe to our newsletter

To be updated with all the latest news and analyses.

Related Articles

State-sponsored hackers in China targeting email services, Microsoft says

Microsoft says the group is based in China but operates through leased virtual private servers in the US, and that it has briefed the US government.

White House imposes sanctions on Moscow for poisoning opposition leader Navalny

Russian leader Vladimir Putin has always denied poisoning Navalny, saying if his security services had done the job Navalny would not have survived.

3 syarikat gergasi global bakal bina pusat data berskala hiper di Malaysia

Microsoft, Google dan Amazon diberikan kelulusan bersyarat untuk membina dan mengurus pusat data dan perkhidmatan awam.

3 global digital giants to set up large-scale data centres in Malaysia

Microsoft, Google and Amazon have been given conditional approval to set up and manage hyper-scale data centres and cloud services in the country.

North Korea accused of hacking Pfizer for Covid-19 vaccine data

Many of the break-in attempts failed but Microsoft has warned that some have been successful.