The U.S. Department of Justice confirmed on Wednesday that it had been the victim of a massive hacking operation linked to Russian intelligence. In a statement, Justice Department spokesman Marc Raimondi said about 3% of the agency’s email accounts appeared to have been compromised, although no classified information was accessed. “After learning of the malicious activity, the Office of Chief Information Officer eliminated the identified method by which the actor was accessing the … email environment,” Raimondi said. Raimondi said the department learned about the previously unknown hack on its networks on Christmas Eve and determined that it constituted a “major” security incident. The disclosure came a day after U.S. intelligence agencies said that the hack was part of an ongoing intelligence operation and likely being carried out by Russia. FILE – This Feb. 11, 2015, photo shows FireEye offices in Milpitas, Calif.The hack came to light in early December when private cybersecurity firm FireEye disclosed that its networks had been compromised. Investigators have traced the breach to SolarWinds, a Texas-based network management software company that the hackers used to penetrate the computer networks. In a statement Tuesday, the FBI, the Cybersecurity & Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA) said that of the approximately 18,000 SolarWinds customers impacted by the hack, “a much smaller number has been compromised by follow-on activity on their systems.” FILE – The SolarWinds logo is seen outside its headquarters in Austin, Texas, Dec. 18, 2020.“We have so far identified fewer than 10 U.S. government agencies that fall into this category and are working to identify the nongovernment entities who also may be impacted,” the agencies said. Officials had previously confirmed that the departments of Defense, Treasury, State, Homeland Security, Commerce and Energy were impacted. Among targeted businesses were Microsoft and Amazon. U.S. President Donald Trump has faced criticism for failing to respond to the alleged Russian hacking operation and for suggesting that China may have been responsible. The National Security Council has set up a task force made up of intelligence agencies to investigate and remediate the attack. “At this time, we believe this was, and continues to be, an intelligence gathering effort,” the agencies said in a statement. “We are taking all necessary steps to understand the full scope of this campaign and respond accordingly.”
…
Category: eNews
Digital and technology news. A newsletter is a printed or electronic report containing news concerning the activities of a business or an organization that is sent to its members, customers, employees or other subscribers
SolarWinds Hack ‘Likely Russian’, US Intelligence Confirms
U.S. intelligence officials investigating last month’s massive cybersecurity breach that impacted thousands of companies and dozens of government agencies warn the hack is part of an ongoing intelligence operation, likely being carried out by Russia. The public conclusion, shared Tuesday by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI) and the National Security Agency (NSA), is the first formal statement of attribution from U.S. officials, and confirms previous comments by senior officials and lawmakers who said the evidence pointed “pretty clearly” to Moscow. FILE – The sign outside the National Security Agency (NSA) campus in Fort Meade, Md., June 6, 2013. All fingers are pointing to Russia as author of the worst-ever hack of U.S. government agencies.”This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and nongovernmental networks,” according to the statement from the intelligence and security agencies. “At this time, we believe this was, and continues to be, an intelligence gathering effort,” they added. “We are taking all necessary steps to understand the full scope of this campaign and respond accordingly.” ‘Serious compromise’Evidence of the breach involving SolarWinds, a Texas-based software management company, first emerged in early December when the private cybersecurity firm FireEye announced its systems had been penetrated and that sensitive information had been stolen. In the days that followed, the hack was traced to SolarWinds, with investigators warning that approximately 18,000 customers, including U.S. government agencies and companies around the world, had been affected. FILE – Microsoft’s corporate headquarters in Redmond, Washington. (VOA/Diaa Bekheet)Late last month, software giant Microsoft said the hackers even managed to use the breach to access some of the company’s heavily guarded source code — the basic programming essential to running Microsoft programs and operating systems. But despite the huge number of SolarWinds customers affected by the hack, U.S. intelligence officials said Tuesday that “a much smaller number” were compromised by follow-on activities. “We have so far identified fewer than 10 U.S. government agencies that fall into this category and are working to identify the nongovernment entities who also may be impacted,” they said in the statement. U.S. officials had previously said the hack had impacted the departments of Defense, State, Homeland Security, Energy, Treasury and Commerce, as well as state and local governments. “This is a serious compromise that will require a sustained and dedicated effort to remediate,” the FBI, CISA, ODNI and the NSA said in Tuesday’s statement, adding the agencies will “continue taking every necessary action to investigate, remediate and share information with our partners and the American people.” Trump responseU.S. President Donald Trump has been largely silent on the SolarWinds hack, tweeting last month, “Everything is well under control,” while appearing to deflect blame from Moscow. “Russia, Russia, Russia is the priority chant when anything happens because Lamestream is, for mostly financial reasons, petrified of discussing the possibility that it may be China,” Trump said.The Cyber Hack is far greater in the Fake News Media than in actuality. I have been fully briefed and everything is well under control. Russia, Russia, Russia is the priority chant when anything happens because Lamestream is, for mostly financial reasons, petrified of….— Donald J. Trump (@realDonaldTrump) December 19, 2020In a tweet late Tuesday, the White House National Security Council said the president “continues to surge all appropriate resources to support the whole-of-government response to the recent cyber incident affecting government networks.”President @realDonaldTrump continues to surge all appropriate resources to support the whole-of-government response to the recent cyber incident affecting government networks. We are taking every necessary step to understand the full scope of this incident & respond accordingly. https://t.co/WnmH2dE1Y7— NSC (@WHNSC) January 5, 2021Democratic Senator Mark Warner, the vice chair of the Senate Intelligence Committee, however, accused the Trump administration of dragging its feet. “It’s unfortunate that it has taken over three weeks after the revelation of an intrusion this significant for this administration to finally issue a tentative attribution,” Warner said in a statement late Tuesday. “We need to make clear to Russia that any misuse of compromised networks to produce destructive or harmful effects is unacceptable and will prompt an appropriately strong response.”
…
US Intelligence Confirms SolarWinds Hack ‘Likely Russian’
U.S. intelligence officials investigating last month’s massive cybersecurity breach that impacted thousands of companies and dozens of government agencies warn the hack is part of an ongoing intelligence operation, likely being carried out by Russia. The public conclusion, shared Tuesday by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI) and the National Security Agency (NSA), is the first formal statement of attribution from U.S. officials, and confirms previous comments by senior officials and lawmakers who said the evidence pointed “pretty clearly” to Moscow. FILE – The sign outside the National Security Agency (NSA) campus in Fort Meade, Md., June 6, 2013. All fingers are pointing to Russia as author of the worst-ever hack of U.S. government agencies.”This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and nongovernmental networks,” according to the statement from the intelligence and security agencies. “At this time, we believe this was, and continues to be, an intelligence gathering effort,” they added. “We are taking all necessary steps to understand the full scope of this campaign and respond accordingly.” ‘Serious compromise’Evidence of the breach involving SolarWinds, a Texas-based software management company, first emerged in early December when the private cybersecurity firm FireEye announced its systems had been penetrated and that sensitive information had been stolen. In the days that followed, the hack was traced to SolarWinds, with investigators warning that approximately 18,000 customers, including U.S. government agencies and companies around the world, had been affected. FILE – Microsoft’s corporate headquarters in Redmond, Washington. (VOA/Diaa Bekheet)Late last month, software giant Microsoft said the hackers even managed to use the breach to access some of the company’s heavily guarded source code — the basic programming essential to running Microsoft programs and operating systems. But despite the huge number of SolarWinds customers affected by the hack, U.S. intelligence officials said Tuesday that “a much smaller number” were compromised by follow-on activities. “We have so far identified fewer than 10 U.S. government agencies that fall into this category and are working to identify the nongovernment entities who also may be impacted,” they said in the statement. U.S. officials had previously said the hack had impacted the departments of Defense, State, Homeland Security, Energy, Treasury and Commerce, as well as state and local governments. “This is a serious compromise that will require a sustained and dedicated effort to remediate,” the FBI, CISA, ODNI and the NSA said in Tuesday’s statement, adding the agencies will “continue taking every necessary action to investigate, remediate and share information with our partners and the American people.” Trump responseU.S. President Donald Trump has been largely silent on the SolarWinds hack, tweeting last month, “Everything is well under control,” while appearing to deflect blame from Moscow. “Russia, Russia, Russia is the priority chant when anything happens because Lamestream is, for mostly financial reasons, petrified of discussing the possibility that it may be China,” Trump said.The Cyber Hack is far greater in the Fake News Media than in actuality. I have been fully briefed and everything is well under control. Russia, Russia, Russia is the priority chant when anything happens because Lamestream is, for mostly financial reasons, petrified of….— Donald J. Trump (@realDonaldTrump) December 19, 2020In a tweet late Tuesday, the White House National Security Council said the president “continues to surge all appropriate resources to support the whole-of-government response to the recent cyber incident affecting government networks.”President @realDonaldTrump continues to surge all appropriate resources to support the whole-of-government response to the recent cyber incident affecting government networks. We are taking every necessary step to understand the full scope of this incident & respond accordingly. https://t.co/WnmH2dE1Y7— NSC (@WHNSC) January 5, 2021Democratic Senator Mark Warner, the vice chair of the Senate Intelligence Committee, however, accused the Trump administration of dragging its feet. “It’s unfortunate that it has taken over three weeks after the revelation of an intrusion this significant for this administration to finally issue a tentative attribution,” Warner said in a statement late Tuesday. “We need to make clear to Russia that any misuse of compromised networks to produce destructive or harmful effects is unacceptable and will prompt an appropriately strong response.”
…
Trump Bans Transactions with 8 Chinese Apps Including Alipay
U.S. President Donald Trump on Tuesday signed an executive order banning transactions with eight Chinese software applications, including Ant Group’s Alipay, the White House said, escalating tensions with Beijing before President-elect Joe Biden takes office this month. The order, first reported by Reuters, tasks the Commerce Department with defining which transactions will be banned under the directive and targets Tencent Holdings Ltd.’s QQ Wallet and WeChat Pay as well. The move is aimed at curbing the threat to Americans posed by Chinese software applications, which have large user bases and access to sensitive data, a senior official told Reuters. A U.S. Tencent spokeswoman did not immediately comment. FILE – WeChat has an average of 19 million daily active users in the United States.The order signed by Trump also names CamScanner, SHAREit, Tencent QQ, VMate and WPS Office and says “the United States must take aggressive action against those who develop or control Chinese connected software applications to protect our national security.” A U.S. official told Reuters that even though the order gave the Commerce Department 45 days to act, the department plans to act before January 20 when Trump leaves office to identify prohibited transactions. Trump’s order says “by accessing personal electronic devices such as smartphones, tablets, and computers, Chinese connected software applications can access and capture vast swaths of information from users, including sensitive personally identifiable information and private information.” It added the data collection “would permit China to track the locations of federal employees and contractors, and build dossiers of personal information.” The Chinese Embassy in Washington did not immediately respond to a request for comment. FILE – A TikTok logo is displayed on a smartphone in this illustration.Another official said the order mirrors earlier Trump executive orders signed in August directing Commerce to block some transactions with WeChat and Chinese-owned Tiktok seeking to bar some transactions that have been blocked by U.S. courts. Any new transactions prohibited by the Trump administration are likely to face similar court challenges as the Commerce Department did when it sought to block transactions with WeChat and TikTok. The Commerce orders would have effectively banned the Chinese app’s use in the United States and barred Apple Inc. and Alphabet Inc.’s app stores from offering them for download for new users. U.S. Secretary of Commerce Wilbur Ross said in a statement he supports Trump’s “commitment to protecting the privacy and security of Americans from threats posed by the Chinese Communist Party.” The latest action has been under debate within the administration for an extended period. Many administration officials are eager to cement the hardline U.S. position with China on a number of fronts before Trump leaves office. Last month, the Commerce Department added dozens of Chinese companies, including the country’s top chipmaker SMIC and Chinese drone manufacturer SZ DJI Technology Co Ltd., to a trade blacklist. Also last month the administration published a list of Chinese and Russian companies with alleged military ties that restrict them from buying a range of U.S. goods and technology. In November, the administration put on hold an effort to blacklist Ant Group, the Chinese financial technology company affiliated with e-commerce giant Alibaba.
…
Online Collaboration Tool Slack Suffers Global Outage
Online communication and collaboration service Slack reported a global outage Monday, as millions returned to work after the Christmas and New Year’s holidays.”Our team is currently investigating, and we’re sorry for any troubles this may be causing,” Slack said in a statement.Slack has seen its popularity grow as many people work and study from home during the coronavirus pandemic. When it last reported, the company said it had 12 million daily users. Slack shares have surged by 80% over the past year.According to The Associated Press, the outage began around 10 a.m. Eastern time, with outages reported in the United States, Germany, India, Britain, Japan and other countries.The disruption in service was the latest in a string of tech outages, which have seen Google services, Zoom and some Microsoft products suffer breakdowns in recent months.According to Bloomberg, Salesforce.com agreed to buy Slack Technologies, Inc. last year for $27.7 billion.
…
Google Employees Form Workers’ Union in United States
More than 200 Google employees in the United States have formed a workers’ union, the elected leaders of the union wrote in a New York Times opinion piece on Monday.
The “Alphabet Workers Union” aims to ensure that employees work at a fair wage, without fear of abuse, retaliation or discrimination, the union heads wrote.
Google has been under fire from the U.S. labor regulator, which has accused the company of unlawfully questioning several workers who were then terminated for protesting against company policies and trying to organize a union. Google has said it was confident it acted legally.
“We’re building on years of organizing efforts at Google to create a formal structure for workers,” the union leaders wrote, adding that so far 226 employees had signed union cards with the Communications Workers of America.
“Our employees have protected labor rights that we support. But as we’ve always done, we’ll continue engaging directly with all our employees,” Kara Silverstein, director of people operations at Google, said on Monday.
…
SolarWinds Hackers Accessed Microsoft Source Code, Microsoft Says
The hacking group behind the SolarWinds compromise was able to break into Microsoft Corp. and access some of its source code, Microsoft said Thursday. In a blog post, Microsoft said its investigation into the SolarWinds breach had turned up irregularities with a “small number of internal accounts” and that one of the accounts “had been used to view source code in a number of source code repositories.” It added that the account had no ability to modify the code. The disclosure adds to the growing picture of the compromises associated with the SolarWinds hack, which used the Texas-based company’s flagship network monitoring software as a springboard to break into sensitive U.S. government networks and other tech companies. Microsoft had disclosed that, like other firms, it found malicious versions of SolarWinds’ software inside its network, but the source code disclosure is new. FILE – A woman walks in front of the Microsoft stand during the Cybersecurity Conference in Lille, northern France, Jan. 29, 2020.A company’s source code, the underlying set of instructions that run a piece of software or an operating system, is typically among its most closely guarded secrets. It is not clear how many or specifically which source code repositories the hackers were able to access or how long the hackers were lurking in Microsoft’s systems. A Microsoft spokesman declined to elaborate on the blog post. Modifying source code, which Microsoft said the hijacked account could not do, could have potentially disastrous consequences, but experts said that even just being able to review the code could offer hackers insight that might help them subvert Microsoft products or services. “The source code is the architectural blueprint of how the software is built,” said Andrew Fife of Israel-based Cycode, a source code protection company. “If you have the blueprint, it’s far easier to engineer attacks.” Both he and Ronen Slavin, Cycode’s chief technology officer, said a key unanswered question was which source code repositories were accessed. Microsoft has a huge range of products, from its flagship Windows operating system to lesser-known software such as social networking app Yammer and the design app Sway. Slavin said he was also worried by the possibility that the SolarWinds hackers were poring over Microsoft’s source code as prelude for something more ambitious. “To me the biggest question is, ‘Was this recon for the next big operation?’ ” he said. In its blog post, Microsoft said it had found no evidence of access “to production services or customer data.” “The investigation, which is ongoing, has also found no indications that our systems were used to attack others,” it said.
…
US Approves Delivery Drones Over Populated Areas
In the not-so-distant future, America’s evening skies could be filled with the buzzing sounds of delivery drones.On Monday, the Federal Aviation Administration (FAA) approved the use of delivery drones over populated areas at night. Many see the move as the next step to widespread adoption of drone deliveries.“The new rules make way for the further integration of drones into our airspace by addressing safety and security concerns,” FAA Administrator Steve Dickson said in a statement. “They get us closer to the day when we will more routinely see drone operations such as the delivery of packages.”Delivery companies like UPS and Amazon have been investing in the technology for years. Both companies have seen surging profits during the coronavirus pandemic as more Americans turn to home delivery for many items, including groceries.Alphabet’s Wing is also investing in drone technology.The FAA said the new regulations provide “an essential building block toward safely allowing more complex” drone operations. According to the new FAA rules, drones of more than a certain weight must have remote identification capabilities and be equipped with anti-collision lights. The FAA also said the drones cannot have any exposed rotating parts that could potentially injure a person.In some cases, the drones can be operated above moving vehicles “depending on the level of risk.” The new rules will become effective 60 days after they are published in the Federal Register next month.Despite the new regulations, Bloomberg reports it will still be years before delivery drones are widely used.
…
Pandemic Helper? Technology Succeeds, Falls Short During the Crisis
People around the world turned to technology to help them get through the pandemic, but in some key ways tech fell short. Michelle Quinn reports.Videographer: Deana Mitchell, Matt Dibble
…
Suspected Russian Hackers Used Microsoft Vendors to Breach Customers
The suspected Russian hackers behind the worst U.S. cyberattack in years used reseller access to Microsoft Corp. services to penetrate targets that had no compromised network software from SolarWinds Corp., investigators said.Updates to SolarWinds’ Orion software were the only known point of entry until Thursday, when security company CrowdStrike Holdings Inc. said hackers had gained access to the vendor that sold it Office licenses and had used that to try to read CrowdStrike’s email. It did not specifically identify the hackers as being the ones that compromised SolarWinds, but two people familiar with CrowdStrike’s investigation said they were.CrowdStrike uses Office programs for word processing but not email. The failed attempt, made months ago, was pointed out to CrowdStrike by Microsoft on December 15.CrowdStrike, which does not use SolarWinds, said it had found no impact from the intrusion attempt and declined to name the reseller.”They got in through the reseller’s access and tried to enable mail ‘read’ privileges,” one person familiar with the investigation told Reuters. “If it had been using Office 365 for email, it would have been game over.”Many Microsoft software licenses are sold through third parties, and those companies can have near-constant access to clients’ systems as the customers add products or employees.Be on guardMicrosoft said Thursday that those customers need to be vigilant.”Our investigation of recent attacks has found incidents involving abuse of credentials to gain access, which can come in several forms,” said Microsoft senior director Jeff Jones. “We have not identified any vulnerabilities or compromise of Microsoft product or cloud services.”The use of a Microsoft reseller to try to break into a top digital defense company raises new questions about how many avenues the hackers, whom U.S. officials have alleged are operating on behalf of the Russian government, have at their disposal.FILE – This Feb. 11, 2015, photo shows FireEye offices in Milpitas, Calif.The known victims so far include CrowdStrike security rival FireEye Inc. and the U.S. departments of Defense, State, Commerce, Treasury and Homeland Security. Other big companies, including Microsoft and Cisco Systems Inc., said they found tainted SolarWinds software internally but had not found signs that the hackers used it to range widely on their networks.Until now, Texas-based SolarWinds was the only publicly confirmed channel for the initial break-ins, although officials have been warning for days that the hackers had other ways in.Microsoft reportReuters reported a week ago that Microsoft products were used in attacks. But federal officials said they had not seen it as an initial vector, and the software giant said its systems were not utilized in the campaign.
Microsoft then hinted that its customers should still be wary. At the end of a long, technical blog post Tuesday, it mentioned seeing hackers reach Microsoft 365 Cloud “from trusted vendor accounts where the attacker had compromised the vendor environment.”Microsoft requires its vendors to have access to client systems in order to install products and allow new users. But discovering which vendors still have access rights at any given time is so hard that CrowdStrike developed and released an auditing tool to do that.After a series of other breaches through cloud providers, including a major set of attacks attributed to Chinese government-backed hackers and known as CloudHopper, Microsoft this year imposed new controls on its resellers, including requirements for multifactor authentication.The Cybersecurity and Infrastructure Security Agency and the National Security Agency had no immediate comment.Also Thursday, SolarWinds released an update to fix the vulnerabilities in its flagship network management software Orion following the discovery of a second set of hackers who had targeted the company’s products.That followed a separate Microsoft blog post Friday saying that SolarWinds’ software had been targeted by a second and unrelated group of hackers in addition to those linked to Russia.The identity of the second set of hackers, or the degree to which they may have successfully broken in anywhere, remains unclear.Russia has denied having any role in the hacking.
…
SolarWinds Hackers ‘Impacting’ State, Local Governments, US Cyber Agency Says
The U.S. cybersecurity agency said on Wednesday that a sprawling cyber espionage campaign made public earlier this month is affecting state and local governments, although it released few additional details.The hacking campaign, which used U.S. tech company SolarWinds as a springboard to penetrate federal government networks, was “impacting enterprise networks across federal, state, and local governments, as well as critical infrastructure entities and other private sector organizations,” the Cybersecurity and Infrastructure Security Agency (CISA) said in a statement posted to its website.The CISA said last week that U.S. government agencies, critical infrastructure entities, and private groups were among those affected but did not specifically mention state or local bodies. So far only a handful of federal government agencies have officially confirmed having been affected, including the U.S. Treasury Department, the Commerce Department, and the Department of Energy.CISA did not identify the state or local agencies affected and did not immediately return an email seeking additional detail on the notice.Reuters has previously reported that Pima County, Arizona, was among the victims of the wave of intrusions.The county did not immediately return a message seeking comment late Wednesday. The county’s chief information officer previously told Reuters his team had taken its SolarWinds software offline immediately after the hack became public and that investigators had not found any evidence of a further compromise.Senior U.S. officials and lawmakers have alleged that Russia is to blame for the hacking spree, a charge the Kremlin denies.
…
Twitter Followers of US Government Accounts Won’t Transfer to Biden
Twitter said Tuesday it would not automatically transfer the millions of followers of official Trump administration accounts to the incoming Biden administration but instead would give users the option to continue or not. The move affects followers of government-led accounts such as @WhiteHouse and @POTUS, which will be transferred to Joe Biden when he takes over the presidency in January. Twitter’s decision won’t affect the personal account @realDonaldTrump, which is frequently used by President Donald Trump and has some 88 million followers. FILE – President Donald Trump’s Twitter feed is photographed on an Apple iPad in New York, June 27, 2019.The official government accounts “will not automatically retain their existing followers. Instead, Twitter will notify followers of these accounts to provide context that the content will be archived and allow them the choice to follow the Biden administration’s new accounts,” a Twitter statement said. “For example, people who follow @WhiteHouse will be notified that the account has been archived as @WhiteHouse45 and given the option to follow the new @WhiteHouse account.” Twitter has been working on the transition for the platform widely used by Trump since the election results were finalized and has indicated that as a private citizen Trump may not have as much leeway in stretching the rules for newsworthy comments. While not as widely followed as Trump’s personal account, @POTUS has some 33 million followers and @WhiteHouse 26 million. The transfer will affect other institutional accounts such as @VP, @FLOTUS, @PressSec, @Cabinet, and @LaCasaBlanca, according to Twitter. Last month, Twitter indicated any special treatment that Trump has enjoyed ends with his presidency. “Twitter’s approach to world leaders, candidates and public officials is based on the principle that people should be able to choose to see what their leaders are saying with clear context,” the San Francisco company said. “This policy framework applies to current world leaders and candidates for office, and not private citizens when they no longer hold these positions.”
…