Foreign Desk Report
New York: Hackers broke into the networks of the Treasury and Commerce Departments as part of a months long global cyberespionage campaign revealed, just days after the prominent cybersecurity firm FireEye said it had been breached in an attack that industry experts said bore the hallmarks of Russian tradecraft.
In response to what may be a large-scale penetration of US government agencies, the Department of Homeland Security’s (DHS) cybersecurity arm issued an emergency directive calling on all federal civilian agencies to scour
their networks for compromises. The threat apparently came from the same cyberespionage campaign that has afflicted FireEye, foreign governments and major corporations, and the Federal Bureau of Investigation (FBI) was investigating.
“This can turn into one of the most impactful espionage campaigns on record,” said cybersecurity expert Dmitri Alperovitch.
News of the hacks, first reported by Reuters, came less than a week after FireEye disclosed that foreign government hackers had broken into its network and stolen the company’s own hacking tools. Many experts suspect Russia is responsible. FireEye’s customers include federal, state and local governments and top global corporations.
The apparent conduit for the Treasury and Commerce Department hacks and the FireEye compromise is a hugely popular piece of server software called SolarWinds. It is used by hundreds of thousands of organisations globally, including most Fortune 500 companies and multiple US federal agencies that will now be scrambling to patch up their networks, said Alperovitch, the former chief technical officer of the cybersecurity firm CrowdStrike. The DHS directive only the fifth since they were created in 2015 said US agencies should immediately disconnect or power down any machines running the impacted SolarWinds software.
FireEye, without naming any specific targets, said in a blog post that its investigation into the hack of its own network had identified “a global campaign” targeting governments and the private sector that, beginning in the spring, had slipped malware into a SolarWinds software update. Neither the company nor US government officials would say whether it believed Russian state-backed hackers were responsible.
The malware gave the hackers remote access to victims’ networks, and Alperovitch said SolarWinds grants “God-mode” access to a network, making everything visible. “We anticipate this will be a very large event when all the information comes to light,” said John Hultquist, director of threat analysis at FireEye. “The actor is operating stealthily, but we are certainly still finding targets that they manage to operate in.”
On its website, SolarWinds says its 300,000 customers worldwide include all five branches of the US military, the Pentagon, the State Department, NASA, the National Security Agency (NSA), the Department of Justice and the White House. It says the 10 leading US telecommunications companies and top five US accounting firms are also among customers.
FireEye said it had confirmed infections in North America, Europe, Asia and the Middle East, including in the health care and oil and gas industry and had been informing affected customers around the world in the past few days. It said that malware that rode the SolarWinds update did not seed self-propagating malware like the 2016 NotPetya malware blamed on Russia that caused more than $10 billion in damage globally and that any actual infiltration of an infected organisation required “meticulous planning and manual interaction.”
That means it’s a good bet only a subset of infected organisations were being spied on by the hackers. Nation-states have their cyberespionage priorities, which include Covid-19 vaccine development. Cybersecurity experts said last week that they considered Russian state hackers to be the main suspect in the FireEye hack. On Sunday, Russia’s US embassy described as “unfounded” in a post on its Facebook page the “attempts of the US media to blame Russia for hacker attacks on US governmental bodies.”
Earlier, National Security Council spokesperson John Ullyot said in a statement that the government was “taking all necessary steps to identify and remedy any possible issues related to this situation”.