On December 7, 1941 Japanese forces hit the US base at Pearl Harbor in a surprise attack just before 8 AM in the morning. The Japanese managed to destroy or damage nearly 20 American naval vessels, including eight battleships, and over 300 airplanes. More than 2,400 Americans died in the attack.
Today intel experts are comparing the latest intelligence breach on the US government to a “Digital Pearl Harbor.”
The National Nuclear Security Administration (NNSA), the U.S. agency that manages the nation’s stockpile of nuclear weapons, is the latest in federal agencies hacked, according to a new report on Thursday.
Officials close to the matter told Politico that the NNSA has evidence of hackers gaining access to the agency’s networks in a mass spy operation that also hacked various other U.S. agencies. The officials don’t yet know what information hackers have been able to access or steal – and it may take weeks to find out.
The Cybersecurity and Infrastructure Security Agency (CISA) tonight issued Emergency Directive 21-01, in response to a known compromise involving SolarWinds Orion products that are currently being exploited by malicious actors. This Emergency Directive calls on all federal civilian agencies to review their networks for indicators of compromise and disconnect or power down SolarWinds Orion products immediately.
“The compromise of SolarWinds’ Orion Network Management Products poses unacceptable risks to the security of federal networks,” said CISA Acting Director Brandon Wales. “Tonight’s directive is intended to mitigate potential compromises within federal civilian networks, and we urge all our partners—in the public and private sectors—to assess their exposure to this compromise and to secure their networks against any exploitation.”
This is the fifth Emergency Directive issued by CISA under the authorities granted by Congress in the Cybersecurity Act of 2015. All agencies operating SolarWinds products should provide a completion report to CISA by 12pm Eastern Standard Time on Monday December 14, 2020.
A foreign hack of the U.S. government is even bigger than originally thought, according to the Cybersecurity and Infrastructure Security Agency.
The Washington Examiner reports the agency shared that the cyber hackers gained secretive backdoor access in more ways than just through the publicly known SolarWinds software update being corrupted.
“One of the initial access vectors for this activity is a supply chain compromise of the following SolarWinds Orion products. CISA has evidence of additional initial access vectors, other than the SolarWinds Orion platform; however, these are still being investigated,” CISA wrote on Thursday, noting that “the SolarWinds Orion supply chain compromise is not the only initial infection vector this advanced persistent threat actor leveraged.”
The US energy department is the latest agency to confirm it has been breached in what is being described as the worst-ever hack on the US government.
The department is responsible for managing US nuclear weapons, but said the arsenal's security had not been compromised.
Tech giant Microsoft also said on Thursday that it had found malicious software in its systems.
Many suspect the Russian government is responsible. It has denied any role.
The US treasury and commerce departments are among the other targets of the sophisticated, months-long breach, which was first acknowledged by officials on Sunday.
Dominion Voting used the same system, Solar Winds, that Russian hackers may have tapped to snake their way into Treasury accounts. “There is concern within the U.S. intelligence community that the hackers who targeted Treasury and the Commerce Department’s National Telecommunications and Information Administration used a similar tool to break into other government agencies, according to four people briefed on the matter.
“The people did not say which other agencies, but late Sunday Austin, Texas-based IT company SolarWinds said software updates it released in March and June of this year may have been surreptitiously tampered with in a “highly-sophisticated, targeted and manual supply chain attack by a nation state.”
No comments:
Post a Comment