• Email Us: [email protected]
  • Contact Us: +1 718 874 1545
  • Skip to main content
  • Skip to primary sidebar

Medical Market Report

  • Home
  • All Reports
  • About Us
  • Contact Us

Hackers in SolarWinds breach stole data on U.S. sanctions policy, intelligence probes -sources

October 7, 2021 by David Barret Leave a Comment

October 7, 2021

By Joseph Menn and Christopher Bing

SAN FRANCISCO (Reuters) -The suspected Russian hackers who used SolarWinds and Microsoft software to burrow into U.S. federal agencies emerged with information about counter-intelligence investigations, policy on sanctioning Russian individuals and the country’s response to COVID-19, people involved in the investigation told Reuters.

The hacks were widely publicized after their discovery late last year, and American officials have blamed Russia’s SVR foreign intelligence service, which denies the activity. But little has been disclosed about the spies’ aims and successes.

The reluctance of some publicly traded companies to explain their exposure has prompted a broad Securities and Exchange Commission inquiry https://ift.tt/3uS1YX7.

The campaign alarmed officials with its stealth and careful staging. The hackers burrowed into the code production process at SolarWinds, which makes widely used software for managing networks.

The group also took advantage of weaknesses in Microsoft’s methods for identifying users in Office 365, breaching some targets that used Microsoft software but not SolarWinds.

It has been previously reported that the hackers breached unclassified Justice Department networks and read emails at the departments of treasury, commerce and homeland security. Nine federal agencies were breached. The hackers also stole digital certificates used to convince computers that software is authorized to run on them and source code from Microsoft https://ift.tt/3avYVuJ and other tech companies.

One of the people involved said that the exposure of counter-intelligence matters being pursued against Russia was the worst of the losses.

A spokesperson for the Justice Department did not respond to a request for comment.

A White House official said that President Joe Biden has issued orders improving federal agency security, among other things requiring more multifactor-authentication and more monitoring of workplace devices.

In an annual threat-review paper released on Thursday https://ift.tt/3oGA4fZ, Microsoft said the Russian spies were ultimately looking for government material on sanctions and other Russia-related policies, along with U.S. methods for catching Russian hackers.

Cristin Goodwin, general manager of Microsoft’s Digital Security Unit, said the company drew its conclusions from the types of customers and accounts it saw being targeted. In such cases, she told Reuters, “You can infer the operational aims from that.”

Others who worked on the government’s investigation went further, saying they could see the terms that the Russians used in their searches of U.S. digital files, including “sanctions.”

Chris Krebs, the former head of U.S. cyber-defense agency CISA and now an adviser to SolarWinds and other companies, said the combined descriptions of the attackers’ goals were logical.

“If I’m a threat actor in an environment, I’ve got a clear set of objectives. First, I want to get valuable intelligence on government decision-making. Sanctions policy makes a ton of sense,” Krebs said.

The second thing is to learn how the target responds to attacks, or “counter-incident response,” he said: “I want to know what they know about me so I can improve my tradecraft and avoid detection.”

(Reporting by Joseph Menn and Christopher Bing; editing by Peter Henderson)

Source Link Hackers in SolarWinds breach stole data on U.S. sanctions policy, intelligence probes -sources

David Barret
David Barret

Related posts:

  1. Venice prepares to charge tourists, require booking
  2. Poland condemns jailing of Belarus protest leaders
  3. Verizon sweetens subsidies on iPhones to match competition
  4. SquadPal is a social app to help remote working teams gel

Filed Under: News

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

  • An “Unknown Biogeographic Barrier” Stops Deep-Sea Jellyfish Crossing The Atlantic
  • Some Giant Predatory Dinosaurs Had Barks (Or At Least Slashes) Worse Than Their Bite
  • World-First Gene Therapy Improves Vision For Man With Rare, Previously Untreatable Form Of Blindness
  • Exceptional 183-Million-Year-Old Fossil With Soft Tissues Intact Is New Species Of Giant Marine Reptile
  • White Raven: This Normally Black Bird Can Be Surprisingly Pale
  • Solar Systems 100 Times Smaller Than Ours Are Possible – Thanks To Rogue Planets
  • North Sea “Sinkites” Appear To Defy Rules Of Geology On Never-Before-Seen Scale
  • The Iberian Ribbed Newt Might Just Have The World’s Most Metal Defense Mechanism
  • There’s Only One Black Moon In 2025 And It’s Happening This Month
  • For First Time In Decades, Winter-Run Chinook Salmon Spotted In Upstream Californian River
  • JWST Shines New Light On 2500 Sources In Iconic Hubble Ultra Deep Field Image
  • Humans And Neanderthals Hooked Up Three Times. Here’s Where It Happened
  • What Happened To Percy Fawcett? The Explorer Who Went In Search “The Lost City Of Z”
  • COVID-19 And Flu Could “Reignite” Dormant Cancer Cells And Bring On New Tumors
  • Do Hair And Nails Really Grow Faster In Summer?
  • Wondrous And Worrying Sights: What Explorers Discovered At The Bottom Of The Great Blue Hole
  • What’s The Biggest Volcano In The World? It Depends How You’re Measuring
  • “Every Species On The Planet Self-Medicates In Some Way”: How Wild Animals Use Medicine
  • Deepest Complex Ecosystem Ever Discovered 10 Kilometers Below The Sea, 892-Kilometer “Megaflash” Lightning Sets New World Record, And Much More This Week
  • The Life And Death Of David Vetter, The Boy Who Lived His Whole Life In A Bubble
  • Business
  • Health
  • News
  • Science
  • Technology
  • +1 718 874 1545
  • +91 78878 22626
  • [email protected]
Office Address
Prudour Pvt. Ltd. 420 Lexington Avenue Suite 300 New York City, NY 10170.

Powered by Prudour Network

Copyrights © 2025 · Medical Market Report. All Rights Reserved.

Go to mobile version