Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/5/2021
04:25 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

FBI, CISA, NSA & ODNI Cite Russia in Joint Statement on 'Serious' SolarWinds Attacks

The attacks appear to be an "intelligence-gathering" mission, the agencies said.

The FBI, DHS's Cybersecurity & Infrastrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and National Security Agency (NSA) today issued a joint statement calling the recent SolarWinds breach and attacks on government networks mostly "an intelligence-gathering effort," and citing Russia the likely perpetrator of the attacks. 

The nod to Russia bolsters previous public statements by members of Congress, Secretary of State Mike Pompeo, and various security experts who have cited Russia as behind the attacks. Some experts believe it's the handiwork of Russia's SVR intelligence agency.

The so-called Cyber Unified Coordination Group (UCG) task force, made up of the FBI, CISA, and ODNI, with assistance of the NSA, has found less than 10 US government agencies were actually attacked via the breach of SolarWinds' Orion network management software.

"The UCG believes that, of the approximately 18,000 affected public and private sector customers of Solar Winds' Orion product, a much smaller number have been compromised by follow-on activity on their systems," the joint statement said. 

Related Content:

5 Key Takeaways From the SolarWinds Breach

Building an Effective Cybersecurity Incident Response Team

New From The Edge: Homomorphic Encryption: The 'Golden Age' of Cryptography

UCG said the APT group is "most likely Russian in origin" and behind "most or all" of the recently spotted attacks on government and private-sector networks. 

"This is a serious compromise that will require a sustained and dedicated effort to remediate," the agencies said.  

Last month CISA revealed that SolarWinds' Orion software wasn't the only initial attack vector: The attackers used other methods as well, which have not yet been publicly disclosed, according to the agency. Meanwhile, last week Microsoft revealed that the SolarWinds attackers had commandeered one of Microsoft's internal accounts to view — but not alter — some of its source code. 

Microsoft maintained that its threat-modeling approach mitigates any risk of the exposed code, but experts say questions remain as a full picture emerges of the impact.

Meantime, the NSA is supporting the UCG, Defense Department, Defense contractors, and national security systems with mitigations and assessments of the scope of the attacks, according to the UCG. UCG says it plans to publish indicators of compromise from the attacks as well as any additional information when they become available.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This is not what I meant by "I would like to share some desk space"
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-3686
PUBLISHED: 2021-01-21
Possible memory out of bound issue during music playback when an incorrect bit stream content is copied into array without checking the length of array in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobi...
CVE-2020-3687
PUBLISHED: 2021-01-21
Local privilege escalation in admin services in Windows environment can occur due to an arbitrary read issue in XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
CVE-2020-3691
PUBLISHED: 2021-01-21
Possible out of bound memory access in audio due to integer underflow while processing modified contents in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon We...
CVE-2020-11167
PUBLISHED: 2021-01-21
Memory corruption while calculating L2CAP packet length in reassembly logic when remote sends more data than expected in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Weara...
CVE-2020-11179
PUBLISHED: 2021-01-21
Arbitrary read and write to kernel addresses by temporarily overwriting ring buffer pointer and creating a race condition. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon ...