About: http://data.cimple.eu/news-article/e95fd05318e7e77c863a991fe27ddea65a506b3146caffc13a8c66a1     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : schema:NewsArticle, within Data Space : data.cimple.eu associated with source document(s)

AttributesValues
rdf:type
schema:articleBody
  • The stunning SolarWinds hack that cybersecurity experts blame on Russia likely took a massive, disciplined effort by more than 1,000 software engineers, Microsoft President Brad Smith said Tuesday. Smith told a hearing of the Senate Intelligence Committee that no other body but Russian intelligence has the ability to muster such an effort, which he branded "reckless" in the breadth of its threat to the globe. Microsoft, one of more than 100 companies attacked and 18,000 left vulnerable by the hack, analyzed the work it took to insert malware into widely used security software created by SolarWinds. "We asked ourselves how many engineers do we believe had worked on this collective effort. And the answer we came to was... at least 1,000, very skilled, capable engineers. "We haven't seen this kind of sophistication matched with this kind of scale," he said. Smith compared previous hacks from Russian- and other government-backed groups to a burglar breaking into a single apartment. The SolarWinds incident was different, he said: it was like a burglar who "manages to turn off the alarm system for every home and every building in the entire city." "Everybody's safety is put at risk. And that is what we're grappling with here," he said. The hack was discovered by computer security firm FireEye in December after it had sat on computers around the world. Among US government agencies penetrated were the National Security Agency, the State Department, Commerce Department and the Treasury. The Washington Post reported Tuesday that the Biden administration was studying options to Punish Moscow for the hack and for other "malign" activity. Last week Anne Neuberger, the senior White House cybersecurity advisor, said her team was looking "holistically" at retaliation. "This isn't the only case of malicious cyber activity of likely Russian origin, either for us or for our allies and partners," she said. In the Senate hearing, FireEye chief executive Kevin Mandia described the hack as the culmination of a "multi-decade" effort by the attackers. He said it took thousands of hours for his staff to discover the bug, and only after tearing apart and decompiling thousands of files on a SolarWinds server. "This was not the first place you look, this was the last place you look for an insertion," he said. Sudhakar Ramakrishna, the chief executive of SolarWinds, said that after months the company still has not found how the hackers managed to implant malware in the middle of the software supply chain -- at the point when completed code is being tailored to downstream users' configurations. "We understand the gravity of the situation," he said. In the hearing, both tech company officials and lawmakers said the breadth of the SolarWinds hack showed there needs to be a mandatory reporting system for companies discovering they have been penetrated by hackers. While currently companies can voluntarily report to the cybersecurity officials of the Department of Homeland Security, some suggested a legal requirement that they do so, to catch future threats early. "It seems to me that there should be an obligation of some sort on the part of a victim of a cyber attack like this to share what they know, what they've learned, with the appropriate authorities," said Senator John Cornyn. "There's got to be a way for folks who are responding to breaches to share data quickly to protect the nation, protect industries," said Mandia. pmh/caw
schema:headline
  • SolarWinds hack required massive, sophisticated effort: Microsoft CEO
schema:mentions
schema:author
schema:datePublished
http://data.cimple...sPoliticalLeaning
http://data.cimple...logy#hasSentiment
http://data.cimple...readability_score
Faceted Search & Find service v1.16.115 as of Oct 09 2023


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3238 as of Jul 16 2024, on Linux (x86_64-pc-linux-musl), Single-Server Edition (126 GB total memory, 3 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2025 OpenLink Software