Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:45 PM
Connect Directly

Russian Hackers Breached White House Via US State Department

Attackers who recently breached the US State Department compromised an unclassified White House system by sending spearphishing messages from a hijacked State Department email account, officials say.

Attackers compromised an unclassified White House system in October by sending spearphishing messages from a hijacked US State Department email account, US officials say. Though unclassified, the system did include some sensitive communications in the executive office, including President Obama's schedule.

Although officials will not confirm that the Russian government is behind the attack, investigators have said the code contains indications that point to Russian sources. The State Department has known of such actors compromising their unclassified email systems over the past year, but seems to be having trouble permanently ousting them from the network.

“Once an attacker gets into your systems it can be notoriously difficult to get them out, particularly when your network and internal security controls allow the attacker to move around on your network without being noticed," says Dwayne Melancon, CTO of Tripwire. "That appears to be the case here, which could be the result of an outwardly focused security approach. If you assume the enemy is ‘out there’ you stop noticing their activities when they get ‘in here.’"

"Additionally, many organizations lack a baseline understanding of what is ‘normal’ on their internal network and systems," he says, "making it difficult to tell which systems you can trust, which systems you can't and -- more importantly -- how to stop the attack and prevent future compromises."

[Everything you need to know about today’s IT security challenges – but were afraid to ask. Register with Discount Code DRBLOG to save $100 for this special one-day event, Dark Reading's Cyber Security Crash Course at Interop on Wednesday, April 29.]

The attackers first capitalized on the trust between two government agencies to spearphish into the White House. Then they sidled through the White House network, looking for intriguing data, like the president's schedule.

"Monitoring and alerting on the first indicators of lateral movement can be the difference between detecting an attacker within a few days or a few months," says Greg Foss, senior security research engineer of LogRhythm. "Monitoring endpoints, segmenting networks, laying traps, creating baselines of what is normal and then digging into the ‘abnormal,’ all are effective strategies for reducing the mean- time-to-detect and respond to an intruder.”

In recent years, the go-to assumptions were that Russian hackers were financially motivated criminals and Chinese hackers were directly sponsored by the nation-state, but those patterns are changing. At a Senate hearing Feb. 26, Director of National Intelligence James Clapper said cryptically, "I cannot go into detail here, but the Russian cyber threat is more severe than we had previously assessed."

“While Russia and other eastern European countries are generally known for cyber-crime, it might be revealed that this breach was state-sponsored rather than run by a criminal organization," says Dave Pack, director, LogRhythm Labs. "Developing offensive cyber capabilities is a natural progression for most countries to augment their intelligence and espionage capabilities with. The same cyber capabilities employed by the US, China, and other world powers, will be built up and utilized by most developed countries in the coming years. We might be seeing a cyber arms race in development.”

“The White House and all national security agencies should assume that Russia, China, North Korea, Iran and others want to infiltrate U.S. computer networks and hosts with the aim of stealing important information," says Muddu Sudhakar, CEO of Caspida. "We should assume by now that other countries have replicated NSA’s capabilities and have similar organizations that are constantly attacking US interests. We need the next level of cyber defense, which will prove early breach detection proactively and in real time, while operating continuously 24/7. We are in a new age of cyber attacks, and as such, need to drastically improve our security measures.”

"If the White House or the State Dept can't keep our foreign hackers with the infinite resources at their disposal...what chance does the average company have?" says Jeremiah Grossman, founder and iCEO of WhiteHat Security. "Not to mention the everyday person. Secondarily, whatever new legislation the White House or Congress is planning, does it have any chance of preventing this kind of incident from happening again?"

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
4/9/2015 | 11:01:58 AM
Re: Fallen behind?
My guess that there has been more going on that we just haven't gotten wind of...
User Rank: Ninja
4/9/2015 | 9:51:40 AM
Fallen behind?
I wonder if US cyber-security has rested on its laurels a bit in recent years, as it seems bizarre that so many attacks are getting through without any obvious repurcussion.

Then again, as has been shown with the NSA revelations, intelligent agencies can do a lot of stuff behind the scenes without us ever knowing, so this could well the case that these sorts of attacks happen all the time both ways and this is simply being dredged up to finagle some political support for legislative or administrative changes. 
User Rank: Ninja
4/9/2015 | 9:38:13 AM
can you imagine?
Can you imagine what the other side must be thinking?

Here we as a country have been snooping, attacking, planting malware, and intercepting their traffic for years and we seem upset when we find them doing the same things.

How ever will we stop them we ask?

It's simple, you can't.  You can't stop our own agencies from spying on us and you can't stop nation states from this continued silent cyberwar.

It's always a good read but it will never be something new we did not expect to find.

We ask how to protect our networks with more tools and products but really can you ever think that we will get ahead of this wave of cyber warfare?


We can try to keep out the criminals and kiddies and insiders and fraudsters, but when it comes to nations, good luck!



7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-14
An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could allow an attacker to smuggle an HTTP request through an HTTP/2 Header. This vulnerability is resolved in 21.1, 20.3R1, 20.2R1, 20.1R2, 19.2R4, and 18.2R3.
PUBLISHED: 2021-05-14
Hexagon G!nius Auskunftsportal before allows SQL injection via the GiPWorkflow/Service/DownloadPublicFile id parameter.
PUBLISHED: 2021-05-13
Piwigo 11.4.0 allows admin/user_list_backend.php order[0][dir] SQL Injection.
PUBLISHED: 2021-05-13
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the ca...
PUBLISHED: 2021-05-13
Bitcoin Core 0.12.0 through 0.21.1 does not properly implement the replacement policy specified in BIP125, which makes it easier for attackers to trigger a loss of funds, or a denial of service attack against downstream projects such as Lightning network nodes. An unconfirmed child transaction with ...