

Data crunching consequences of SolarWinds cyberattack
source link: https://techxplore.com/news/2020-12-unquantified-consequences-solarwinds-cyberattack.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

December 17, 2020
Data crunching consequences of SolarWinds cyberattack

Thousands of companies and institutions across the globe have to check if they have been hacked via security software from Texan firm SolarWinds at the heart of a cyberattack on several US government agencies.
Here is what we know to date about the sophisticated attack:
How did the hackers get in?
Hackers managed to compromise and instal malware on a piece of security software -– the Orion security tool developed by SolarWinds which is used for management and supervision of IT networks at many large companies and several US government agencies.
Rather than attack directly clients who include top accounting firms—but also the full gamut of military branches—the hackers aimed to compromise the software's automatic update function.
Beyond the content of the data hacked, the break-in further allowed the crypto burglars to gain an idea of their victim's systemic structural vulnerabilities.
The attack was discovered by cybersecurity company FireEye, which, along with SolarWinds, has pointed the finger at people linked to the Russian government.
Taking care only to upload stolen data in relatively small quantities, the hackers reportedly breached software used by the US Treasury Department, the Commerce Department and the Department of Homeland Security, allowing them to view internal email traffic, prompting an FBI investigation.
The software had enjoyed much commercial success based not least on its state of the art ergonomic interface.
The malware was laced into the software updates that breached network security and allowed access to data including mail, with FireEye saying the breaches began around last March.
Who are the victims?
According to SolarWinds, 18,000 users of Orion have potentially suffered a security breach, including government agencies and Fortune 500 companies.
For now, experts say the hackers seem primarily to have used a security flaw, dubbed Sunburst, to break into US governmental agencies, insert malicious code and gain access to data to aid state espionage.
FireEye discovered the flaw through its own usage of SolarWinds and was itself affected by certain tools it was deploying to test its clients' security.
According to FireEye, what it termed a state sponsored attack targeted governments as well as leading global enterprises notably in the technology and energy sectors in North America, Europe, Asia and the Middle East.
According to Jacques de la Riviere, who runs French cybersecurity firm Gatewatcher, it is still too early to know which other firms or institutions have been infiltrated.
The actual content of what the hackers were targeting and to what extent they were successful also remains unknown.
Cybersecurity systems across the globe are on alert to track any suspicious activity that could suggest the compromising of data held by SolarWinds.
Firms or institutions that have used infected updates are urged to disconnect their servers and check for telltale signs their data might have been compromised.
Who is to blame?
FireEye and Microsoft believe the attack was by a nation state and expert analysis has pointed the finger at Russia, as have anonymous US security sources. As yet, Washington has yet to give the accusation its official seal.
These US sources have focused on an organisation known as advanced persistent threat (APT) 29, or Cozy Bear, which is believed to be linked to one or more Russian intelligence agencies and previously pirated the White House under President Barack Obama.
Lessons to learn
Jacques de la Riviere says he has responded by ramping up protection on his own servers.
Beyond that he hopes the high-profile attack will encourage firms and institutions to be more demanding when it comes to stewardship of their data and software security.
"This could be a turning point, where many clients are going to start saying 'I no longer want to purchase software that has not been certified by a third party'," he said.
Explore further
© 2020 AFP
Recommend
-
11
Reading Time: 3 minutes In our
-
14
SolarWinds Sunburst: UK data watchdog issues hack alertPublishedduration2 days agoimage copyrightEPAThe UK's data privacy regulator has told organisations under its watch they...
-
5
Microsoft's investigation into the headline-grabbing SolarWinds cyberattack continues, with more information coming to light regarding the attackers' intentions. ...
-
6
What SolarWinds Taught Enterprises About Data ProtectionA new approach is emerging to help stay on top of data protection, assuming the system has already been breached. Credit: sdecoret via Ad...
-
9
June 24, 2021 ...
-
15
Why I sometimes like to write my own number crunching code You can adopt a pet function! Support my work on my Patreon page, and access m...
-
11
Crunching Large Datasets Made Fast and Easy: the Polars LibraryJanuary 10th 2022 new story6...
-
5
SmartData Collective >
-
11
T-Mobile’s $350M Settlement and the Future of Data Breach ConsequencesFollowing a data breach that impacted more than 75 million consumers, T-Mobile has agreed to a $350 million class action settlement. What does this hefty de...
-
8
Art Of Knowledge Crunching In Domain Driven Design In this article...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK