SolarWinds hack result of a “multi-decade” effort by cyber attackers
The stunning SolarWinds hack that cybersecurity experts blame on Russia likely took a massive, disciplined effort by more than 1,000 software engineers, Microsoft President Brad Smith said last Tuesday, the 23rd of February.
Smith told a hearing of the Senate Intelligence Committee that no other body but Russian intelligence has the ability to muster such an effort, which he branded “reckless” in the breadth of its threat to the globe.
Microsoft, one of more than 100 companies attacked and 18,000 left vulnerable by the hack, analyzed the work it took to insert malware into widely used security software created by SolarWinds.
“We asked ourselves how many engineers do we believe had worked on this collective effort. And the answer we came to was… at least 1,000 very skilled, capable engineers. We haven’t seen this kind of sophistication matched with this kind of scale,” he said.
Smith compared previous hacks from Russian- and other government-backed groups to a burglar breaking into a single apartment.
The SolarWinds incident was different, he said: it was like a burglar who “manages to turn off the alarm system for every home and every building in the entire city.”
“Everybody’s safety is put at risk. And that is what we’re grappling with here,” he said. The hack was discovered by computer security firm FireEye in December after it had sat on computers around the world.
Among US government agencies penetrated were the National Security Agency, the State Department, Commerce Department, and the Treasury.
The Washington Post reported Tuesday that the Biden administration was studying options to punish Moscow for the hack and for other “malign” activity. The previous week Anne Neuberger, the senior White House cybersecurity advisor, said her team was looking “holistically” at retaliation.
“This isn’t the only case of malicious cyber activity of likely Russian origin, either for us or for our allies and partners,” she said.
In the Senate hearing, FireEye chief executive Kevin Mandia described the hack as the culmination of a “multi-decade” effort by the attackers.
He said it took thousands of hours for his staff to discover the bug, and only after tearing apart and decompiling thousands of files on a SolarWinds server. “This was not the first place you look, this was the last place you look for an insertion,” he said.
Sudhakar Ramakrishna, the chief executive of SolarWinds, said that after months the company still has not found how the hackers managed to implant malware in the middle of the software supply chain – at the point when completed code is being tailored to downstream users’ configurations.
“We understand the gravity of the situation,” he said.
In the hearing, both tech company officials and lawmakers said the breadth of the SolarWinds hack showed there needs to be a mandatory reporting system for companies discovering they have been penetrated by hackers.
While currently, companies can voluntarily report to the cybersecurity officials of the Department of Homeland Security, some suggested a legal requirement that they do so, to catch future threats early.
“It seems to me that there should be an obligation of some sort on the part of a victim of a cyber attack like this to share what they know, what they’ve learned, with the appropriate authorities,” said Senator John Cornyn.
“There’s got to be a way for folks who are responding to breaches to share data quickly to protect the nation, protect industries,” said Mandia.
© Agence France-Presse
- Does Meta’s AI strategy stand a chance against OpenAI’s advances?
- Japanese start-up builds a Gundam-like robot
- Mobile gaming is dominating consumer spending on games in 2023 compared to other platforms
- Fortifying Australian cyber-resilience through attack surface management
- What is Cyber Threat Intelligence, and why do I need it?