In 2020, a major
cyberattack
A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
suspected to have been committed by a
group backed by the Russian government penetrated thousands of organizations globally including multiple parts of the
United States federal government
The federal government of the United States (U.S. federal government or U.S. government) is the national government of the United States, a federal republic located primarily in North America, composed of 50 states, a city within a fede ...
, leading to a series of
data breach
A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, info ...
es.
The cyberattack and data breach were reported to be among the worst
cyber-espionage incidents ever suffered by the U.S., due to the sensitivity and high profile of the targets and the long duration (eight to nine months) in which the hackers had access. Within days of its discovery, at least 200 organizations around the world had been reported to be affected by the attack, and some of these may also have suffered data breaches.
Affected organizations worldwide included
NATO
The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two No ...
, the
U.K
The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Europe, off the north-western coast of the continental mainland. It comprises England, Scotland, Wales and North ...
. government, the
European Parliament
The European Parliament (EP) is one of the legislative bodies of the European Union and one of its seven institutions. Together with the Council of the European Union (known as the Council and informally as the Council of Ministers), it adop ...
,
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
and others.
The attack, which had gone undetected for months, was first publicly reported on December 13, 2020,
and was initially only known to have affected the
U.S. Treasury Department
The Department of the Treasury (USDT) is the national treasury and finance department of the federal government of the United States, where it serves as an executive department. The department oversees the Bureau of Engraving and Printing and t ...
and the
National Telecommunications and Information Administration
The National Telecommunications and Information Administration (NTIA) is an agency of the United States Department of Commerce that serves as the President's principal adviser on telecommunications policies pertaining to the United States' e ...
(NTIA), part of the
U.S. Department of Commerce
The United States Department of Commerce is an executive department of the U.S. federal government concerned with creating the conditions for economic growth and opportunity. Among its tasks are gathering economic and demographic data for busi ...
. In the following days, more departments and private organizations reported breaches.
The cyberattack that led to the breaches began no later than March 2020.
The attackers exploited software or credentials from at least three U.S. firms:
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
,
SolarWinds
SolarWinds Corporation is an American company that develops software for businesses to help manage their networks, systems, and information technology infrastructure. It is headquartered in Austin, Texas, with sales and product development of ...
, and
VMware
VMware, Inc. is an American cloud computing and virtualization technology company with headquarters in Palo Alto, California. VMware was the first commercially successful company to virtualize the x86 architecture.
VMware's desktop software ru ...
.
A
supply chain attack
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. ...
on Microsoft cloud services provided one way for the attackers to breach their victims, depending upon whether the victims had bought those services through a reseller.
A supply chain attack on SolarWinds's Orion software,
widely used in government and industry, provided another avenue, if the victim used that software.
Flaws in Microsoft and VMware products allowed the attackers to access emails and other documents,
and to perform
federated authentication across victim resources via
single sign-on
Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.
True single sign-on allows the user to log in once and access services without re-enterin ...
infrastructure.
In addition to the theft of data, the attack caused costly inconvenience to tens of thousands of SolarWinds customers, who had to check whether they had been breached, and had to take systems offline and begin months-long decontamination procedures as a precaution.
U.S. Senator
Richard J. Durbin
Richard Joseph Durbin (born November 21, 1944) is an American lawyer and politician serving as the senior United States senator from Illinois, a seat he has held since 1997. A member of the Democratic Party, Durbin has served as the Senate De ...
described the cyberattack as tantamount to a declaration of war.
President
Donald Trump
Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who served as the 45th president of the United States from 2017 to 2021.
Trump graduated from the Wharton School of the University of ...
was silent for days after the attack, before suggesting that
China, not
Russia
Russia (, , ), or the Russian Federation, is a transcontinental country spanning Eastern Europe and Northern Asia. It is the largest country in the world, with its internationally recognised territory covering , and encompassing one-eigh ...
, might have been responsible for it, and that "everything is well under control".
Background
SolarWinds
SolarWinds Corporation is an American company that develops software for businesses to help manage their networks, systems, and information technology infrastructure. It is headquartered in Austin, Texas, with sales and product development of ...
, a
Texas
Texas (, ; Spanish language, Spanish: ''Texas'', ''Tejas'') is a state in the South Central United States, South Central region of the United States. At 268,596 square miles (695,662 km2), and with more than 29.1 million residents in 2 ...
-based provider of network monitoring software to the U.S. federal government, had shown several security shortcomings prior to the attack.
SolarWinds did not employ a chief information security officer or senior director of cybersecurity.
Cybercriminals had been selling access to SolarWinds's infrastructure since at least as early as 2017.
SolarWinds had been advising customers to disable antivirus tools before installing SolarWinds software.
In November 2019, a security researcher had warned SolarWinds that their
FTP server was not secure, warning that "any hacker could upload malicious
iles Iles is a surname. Notable people with the surname include:
*Albert Iles (1914–1979), English footballer
*Alex Iles, American musician
*Bob Iles (born 1955), English footballer
*Bradley Iles (born 1983), New Zealand golfer
* Brian Iles, American ...
that would then be distributed to SolarWinds customers.
Furthermore, SolarWinds's
Microsoft Office 365
Microsoft 365 is a product family of productivity software, collaboration and cloud-based services owned by Microsoft. It encompasses online services such as Outlook.com, OneDrive, Microsoft Teams, programs formerly marketed under the name Mi ...
account had been compromised, with the attackers able to access emails and possibly other documents.
On December 7, 2020, a few days before
trojaned SolarWinds software was publicly confirmed to have been used to attack other organizations, longstanding SolarWinds CEO Kevin Thompson retired.
That same day, two private equity firms with ties to SolarWinds's board sold substantial amounts of stock in SolarWinds.
The firms denied
insider trading
Insider trading is the trading of a public company's stock or other securities (such as bonds or stock options) based on material, nonpublic information about the company. In various countries, some kinds of trading based on insider informati ...
.
Methodology
Multiple
attack vectors were used in the course of breaching the various victims of the incident.
Microsoft exploits
The attackers exploited flaws in Microsoft products, services, and software distribution infrastructure.
At least one reseller of Microsoft cloud services was compromised by the attackers, constituting a
supply chain attack
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. ...
that allowed the attackers to access Microsoft cloud services used by the reseller's customers.
Alongside this, "
Zerologon Zerologon (formally: ) is a critical vulnerability in Microsoft's authentication protocol Netlogon, as implemented in some versions of Microsoft Windows and Samba.
Severity
Zerologon has a score of 10 under the Common Vulnerability Scoring System ...
", a vulnerability in the Microsoft authentication protocol NetLogon, allowed attackers to access all valid usernames and passwords in each Microsoft network that they breached.
This allowed them to access additional credentials necessary to assume the privileges of any legitimate user of the network, which in turn allowed them to compromise
Microsoft Office 365
Microsoft 365 is a product family of productivity software, collaboration and cloud-based services owned by Microsoft. It encompasses online services such as Outlook.com, OneDrive, Microsoft Teams, programs formerly marketed under the name Mi ...
email accounts.
Additionally, a flaw in Microsoft's
Outlook Web App
Outlook on the web (previously known as Exchange Web Connect, Outlook Web Access, and Outlook Web App) is a personal information manager web app from Microsoft. It includes a web-based email client, a calendar tool, a contact manager, and a ta ...
may have allowed attackers to bypass
multi-factor authentication
Multi-factor authentication (MFA; encompassing two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting ...
.
Attackers were found to have broken into
Microsoft Office 365
Microsoft 365 is a product family of productivity software, collaboration and cloud-based services owned by Microsoft. It encompasses online services such as Outlook.com, OneDrive, Microsoft Teams, programs formerly marketed under the name Mi ...
in a way that allowed them to monitor NTIA and Treasury staff emails for several months.
This attack apparently used counterfeit identity tokens of some kind, allowing the attackers to trick Microsoft's authentication systems.
The presence of
single sign-on
Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.
True single sign-on allows the user to log in once and access services without re-enterin ...
infrastructure increased the
viability of the attack.
SolarWinds exploit
Here, too, the attackers used a
supply chain attack
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. ...
.
The attackers accessed the
build system belonging to the software company
SolarWinds
SolarWinds Corporation is an American company that develops software for businesses to help manage their networks, systems, and information technology infrastructure. It is headquartered in Austin, Texas, with sales and product development of ...
, possibly via SolarWinds's
Microsoft Office 365
Microsoft 365 is a product family of productivity software, collaboration and cloud-based services owned by Microsoft. It encompasses online services such as Outlook.com, OneDrive, Microsoft Teams, programs formerly marketed under the name Mi ...
account, which had also been compromised at some point.
The attackers established a foothold in SolarWinds's software publishing infrastructure no later than September 2019.
In the build system, the attackers surreptitiously modified software updates provided by SolarWinds to users of its network monitoring software Orion.
The first known modification, in October 2019, was merely a
proof of concept
Proof of concept (POC or PoC), also known as proof of principle, is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has prac ...
.
Once the proof had been established, the attackers spent December 2019 to February 2020 setting up a
command-and-control
Command and control (abbr. C2) is a "set of organizational and technical attributes and processes ... hatemploys human, physical, and information resources to solve problems and accomplish missions" to achieve the goals of an organization or en ...
infrastructure.
In March 2020, the attackers began to plant
remote access tool
In computing, the term remote desktop refers to a software- or operating system feature that allows a personal computer's desktop environment to be run remotely off of one system (usually a PC, but the concept applies equally to a server or a ...
malware into Orion updates, thereby
trojaning them.
These users included U.S. government customers in the executive branch, the military, and the intelligence services (see
Impact
Impact may refer to:
* Impact (mechanics), a high force or shock (mechanics) over a short time period
* Impact, Texas, a town in Taylor County, Texas, US
Science and technology
* Impact crater, a meteor crater caused by an impact event
* Impac ...
section, below).
If a user installed the update, this would execute the malware payload, which would stay dormant for 12–14 days before attempting to communicate with one or more of several command-and-control servers.
The communications were designed to mimic legitimate SolarWinds traffic.
If able to contact one of those servers, this would alert the attackers of a successful malware deployment and offer the attackers a
back door that the attackers could choose to utilise if they wished to exploit the system further.
The malware started to contact command-and-control servers in April 2020, initially from North America and Europe and subsequently from other continents too.
The attackers appear to have utilized only a small fraction of the successful malware deployments: ones located within computer networks belonging to high-value targets.
Once inside the target networks, the attackers
pivoted, installing exploitation tools such as Cobalt strike components,
and seeking additional access.
Because Orion was connected to customers' Office 365 accounts as a trusted 3rd-party application, the attackers were able to access emails and other confidential documents.
This access apparently helped them to hunt for certificates that would let them sign
SAML
Security Assertion Markup Language (SAML, pronounced ''SAM-el'', ) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SAML is an XML-based m ...
tokens, allowing them to
masquerade as legitimate users to additional on-premises services and to cloud services like
Microsoft Azure Active Directory
In computing, Microsoft Azure Active Directory, commonly known as Azure AD, is a system in Microsoft Azure that enables the identity management to configure accessibility of users and groups to services and resources. It shares the same name wi ...
.
Once these additional footholds had been obtained, disabling the compromised Orion software would no longer be sufficient to sever the attackers' access to the target network.
Having accessed data of interest, they encrypted and exfiltrated it.
The attackers hosted their command-and-control servers on commercial cloud services from
Amazon
Amazon most often refers to:
* Amazons, a tribe of female warriors in Greek mythology
* Amazon rainforest, a rainforest covering most of the Amazon basin
* Amazon River, in South America
* Amazon (company), an American multinational technolog ...
,
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
,
GoDaddy
GoDaddy Inc. is an American publicly traded Internet domain registrar and web hosting company headquartered in Tempe, Arizona, and incorporated in Delaware.
, GoDaddy has more than 21 million customers and over 6,600 employees worldwide. The ...
and others.
By using
command-and-control
Command and control (abbr. C2) is a "set of organizational and technical attributes and processes ... hatemploys human, physical, and information resources to solve problems and accomplish missions" to achieve the goals of an organization or en ...
IP addresses based in the U.S., and because much of the malware involved was new, the attackers were able to evade detection by
Einstein
Albert Einstein ( ; ; 14 March 1879 – 18 April 1955) was a German-born theoretical physicist, widely acknowledged to be one of the greatest and most influential physicists of all time. Einstein is best known for developing the theory ...
, a national cybersecurity system operated by the
Department of Homeland Security
The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-te ...
(DHS).
FBI investigators recently found that a separate flaw in software made by SolarWinds Corp was used by hackers tied to another foreign government to help break into U.S. government computers.
VMware exploits
Vulnerabilities in VMware Access and VMware Identity Manager, allowing existing network intruders to pivot and gain persistence, were utilized in 2020 by Russian state-sponsored attackers.
As of December 18, 2020, while it was definitively known that the SUNBURST trojan would have provided suitable access to exploit the VMware bugs, it was not yet definitively known whether attackers had in fact chained those two exploits in the wild.
Discovery
Microsoft exploits
During 2019 and 2020, cybersecurity firm Volexity discovered an attacker making suspicious usage of Microsoft products within the network of a
think tank
A think tank, or policy institute, is a research institute that performs research and advocacy concerning topics such as social policy, political strategy, economics, military, technology, and culture. Most think tanks are non-governmental ...
whose identity has not publicly been revealed.
The attacker exploited a vulnerability in the organization's Microsoft Exchange Control Panel, and used a novel method to bypass
multi-factor authentication
Multi-factor authentication (MFA; encompassing two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting ...
.
Later, in June and July 2020, Volexity observed the attacker utilising the SolarWinds Orion trojan; i.e. the attacker used Microsoft vulnerabilities (initially) and SolarWinds supply chain attacks (later on) to achieve their goals.
Volexity said it was not able to identify the attacker.
Also in 2020, Microsoft detected attackers using Microsoft Azure infrastructure in an attempt to access emails belonging to
CrowdStrike
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in inves ...
.
That attack failed because - for security reasons - CrowdStrike does not use Office 365 for email.
Separately, in or shortly before October 2020, Microsoft Threat Intelligence Center reported that an apparently state-sponsored attacker had been observed exploiting zerologon, a vulnerability in Microsoft's NetLogon protocol.
This was reported to CISA, who issued an alert on October 22, 2020, specifically warning state, local, territorial and tribal governments to search for indicators of compromise, and instructing them to rebuild their networks from scratch if compromised.
Using
VirusTotal
VirusTotal is a website created by the Spanish security company Hispasec Sistemas. Launched in June 2004, it was acquired by Google in September 2012. The company's ownership switched in January 2018 to Chronicle, a subsidiary of Google.
Vi ...
, ''
The Intercept
''The Intercept'' is an American left-wing news website founded by Glenn Greenwald, Jeremy Scahill, Laura Poitras and funded by billionaire eBay co-founder Pierre Omidyar. Its current editor is Betsy Reed. The publication initially repor ...
'' discovered continued indicators of compromise in December 2020, suggesting that the attacker might still be active in the network of the city government of
Austin, Texas
Austin is the capital city of the U.S. state of Texas, as well as the county seat, seat and largest city of Travis County, Texas, Travis County, with portions extending into Hays County, Texas, Hays and Williamson County, Texas, Williamson co ...
.
SolarWinds exploit
On December 8, 2020, the cybersecurity firm
FireEye
Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company founded in 2022. It has been involved in the detection and prevention of major cyber attacks.
It provides hardware, software, and services to investigat ...
announced that
red team
A red team or team red are a group that plays the role of an enemy or competitor to provide security feedback from that perspective. Red teams are used in many fields, especially in cybersecurity, airport security, law enforcement, the military ...
tools had been stolen from it by what it believed to be a state-sponsored attacker.
FireEye was believed to be a target of the
SVR, Russia's Foreign Intelligence Service.
FireEye says that it discovered the SolarWinds supply chain attack in the course of investigating FireEye's own breach and tool theft.
After discovering that attack, FireEye reported it to the
U.S. National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
(NSA), a federal agency responsible for helping to defend the U.S. from cyberattacks.
The NSA is not known to have been aware of the attack before being notified by FireEye.
The NSA uses SolarWinds software itself.
Some days later, on December 13, when breaches at the Treasury and Department of Commerce were publicly confirmed to exist,
sources
Source may refer to:
Research
* Historical document
* Historical source
* Source (intelligence) or sub source, typically a confidential provider of non open-source intelligence
* Source (journalism), a person, publication, publishing institute ...
said that the FireEye breach was related.
On December 15, FireEye confirmed that the
vector
Vector most often refers to:
*Euclidean vector, a quantity with a magnitude and a direction
*Vector (epidemiology), an agent that carries and transmits an infectious pathogen into another living organism
Vector may also refer to:
Mathematic ...
used to attack the Treasury and other government departments was the same one that had been used to attack FireEye: a trojaned software update for SolarWinds Orion.
The security community shifted its attention to Orion. The infected versions were found to be ''2019.4'' through ''2020.2.1 HF1'', released between March 2020 and June 2020.
FireEye named the malware SUNBURST.
Microsoft called it Solorigate.
The tool that the attackers used to insert SUNBURST into Orion updates was later isolated by cybersecurity firm CrowdStrike, who called it SUNSPOT.
Subsequent analysis of the SolarWinds compromise using
DNS
The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to ...
data and
reverse engineering
Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompli ...
of Orion
binaries
A binary file is a computer file that is not a text file. The term "binary file" is often used as a term meaning "non-text file". Many binary file formats contain parts that can be interpreted as text; for example, some computer document file ...
, by DomainTools and ReversingLabs respectively, revealed additional details about the attacker's timeline.
July 2021 analysis published by the Google Threat Analysis Group found that a "likely Russian government-backed actor" exploited a zero-day vulnerability in fully-updated iPhones to steal authentication credentials by sending messages to government officials on
LinkedIn
LinkedIn () is an American business and employment-oriented online service that operates via websites and mobile apps. Launched on May 5, 2003, the platform is primarily used for professional networking and career development, and allows job s ...
.
VMware exploits
Some time before December 3, 2020, the NSA discovered and notified VMware of vulnerabilities in VMware Access and VMware Identity Manager.
VMware released patches on December 3, 2020.
On December 7, 2020, the NSA published an advisory warning customers to apply the patches because the vulnerabilities were being actively exploited by Russian state-sponsored attackers.
Responsibility
Conclusions by investigators
SolarWinds said it believed the malware insertion into Orion was performed by a foreign nation.
Russian-sponsored
hackers
A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
were suspected to be responsible.
U.S. officials stated that the specific groups responsible were probably the
SVR or
Cozy Bear
Cozy Bear, classified by the United States federal government as advanced persistent threat APT29, is a Russian hacker group believed to be associated with one or more intelligence agencies of Russia. The Dutch General Intelligence and Securit ...
(also known as APT29).
FireEye gave the suspects the placeholder name "UNC2452";
incident response
An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Incident management (IcM) is a term describing the activities of an organization to identify, analyze, and correct hazards ...
firm Volexity called them "Dark Halo".
On December 23, 2020, the CEO of FireEye said Russia was the most likely culprit and the attacks were "very consistent" with the SVR.
One security researcher offers the likely operational date, February 27, 2020, with a significant change of aspect on October 30, 2020.
In January 2021, cybersecurity firm
Kaspersky said SUNBURST resembles the malware Kazuar, which is believed to have been created by
Turla,
a group known from 2008 that Estonian intelligence previously linked to the Russian federal security service, FSB.
Statements by U.S. government officials
On October 22, 2020, CISA and the FBI identified the Microsoft zerologon attacker as
Berserk Bear
Berserk Bear (aka Crouching Yeti, Dragonfly, Dragonfly 2.0, DYMALLOY, Energetic Bear, Havex, IRON LIBERTY, Koala, or TeamSpy) is a Russian cyber espionage group, sometimes known as an advanced persistent threat. According to the United States, the ...
, a state-sponsored group believed to be part of Russia's
FSB.
On December 18,
U.S. Secretary of State
The United States secretary of state is a member of the executive branch of the federal government of the United States and the head of the U.S. Department of State. The office holder is one of the highest ranking members of the president's Ca ...
Mike Pompeo
Michael Richard Pompeo (; born December 30, 1963) is an American politician, diplomat, and businessman who served under President Donald Trump as director of the Central Intelligence Agency (CIA) from 2017 to 2018 and as the 70th United State ...
said Russia was "pretty clearly" responsible for the cyber attack.
On December 19, U.S. president
Donald Trump
Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who served as the 45th president of the United States from 2017 to 2021.
Trump graduated from the Wharton School of the University of ...
publicly addressed the attacks for the first time, downplaying its severity and suggesting without evidence that China, rather than Russia, might be responsible.
The same day, Republican senator
Marco Rubio
Marco Antonio Rubio (born May 28, 1971) is an American politician and lawyer serving as the senior United States senator from Florida, a seat he has held since 2011. A member of the Republican Party, he served as Speaker of the Florida House ...
, acting chair of the
Senate Intelligence Committee
The United States Senate Select Committee on Intelligence (sometimes referred to as the Intelligence Committee or SSCI) is dedicated to overseeing the United States Intelligence Community—the agencies and bureaus of the federal government of ...
, said it was "increasingly clear that Russian intelligence conducted the gravest cyber intrusion in our history."
On December 20, Democratic senator
Mark Warner
Mark Robert Warner (born December 15, 1954) is an American businessman and politician serving as the senior United States senator from Virginia, a seat he has held since 2009. A member of the Democratic Party, Warner served as the 69th govern ...
, briefed on the incident by intelligence officials, said "all indications point to Russia."
On December 21, 2020, former Attorney General
William Barr
William Pelham Barr (born May 23, 1950) is an American attorney who served as the 77th and 85th United States attorney general in the administrations of Presidents George H. W. Bush and Donald Trump.
Born and raised in New York City, Barr ...
said that he agreed with Pompeo's assessment of the origin of the cyberhack and that it "certainly appears to be the Russians," contradicting Trump.
On January 5, 2021, CISA, the FBI, the NSA, and the Office of the Director of National Intelligence, all confirmed that they believe Russia was the most likely culprit.
On June 10, 2021,
FBI Director
The Director of the Federal Bureau of Investigation is the head of the Federal Bureau of Investigation, a United States' federal law enforcement agency, and is responsible for its day-to-day operations. The FBI Director is appointed for a singl ...
Christopher Wray attributed the attack to Russia's
SVR specifically.
Denial of involvement
The Russian government said that it was not involved.
The Chinese foreign ministry said in a statement, "China resolutely opposes and combats any form of cyberattacks and cyber theft."
Impact
SolarWinds said that of its 300,000 customers, 33,000 use Orion.
Of these, around 18,000 government and private users downloaded compromised versions.
Discovery of the breaches at the U.S. Treasury and Commerce Departments immediately raised concerns that the attackers would attempt to breach other departments, or had already done so.
Further investigation proved these concerns to be well-founded.
Within days,
additional federal departments were found to have been breached.
Reuters
Reuters ( ) is a news agency owned by Thomson Reuters Corporation. It employs around 2,500 journalists and 600 photojournalists in about 200 locations worldwide. Reuters is one of the largest news agencies in the world.
The agency was est ...
quoted an anonymous U.S. government source as saying: “This is a much bigger story than one single agency. This is a huge cyber espionage campaign targeting the U.S. government and its interests.”
Compromised versions were known to have been downloaded by the
Centers for Disease Control and Prevention
The Centers for Disease Control and Prevention (CDC) is the national public health agency of the United States. It is a United States federal agency, under the Department of Health and Human Services, and is headquartered in Atlanta, Georg ...
, the
Justice Department
A justice ministry, ministry of justice, or department of justice is a ministry or other government agency in charge of the administration of justice. The ministry or department is often headed by a minister of justice (minister for justice in a ...
, and some utility companies.
Other prominent U.S. organisations known to use SolarWinds products, though not necessarily Orion, were the
Los Alamos National Laboratory
Los Alamos National Laboratory (often shortened as Los Alamos and LANL) is one of the sixteen research and development laboratories of the United States Department of Energy (DOE), located a short distance northwest of Santa Fe, New Mexico, i ...
,
Boeing
The Boeing Company () is an American multinational corporation that designs, manufactures, and sells airplanes, rotorcraft, rockets, satellites, telecommunications equipment, and missiles worldwide. The company also provides leasing and ...
, and most
Fortune 500
The ''Fortune'' 500 is an annual list compiled and published by '' Fortune'' magazine that ranks 500 of the largest United States corporations by total revenue for their respective fiscal years. The list includes publicly held companies, along ...
companies.
Outside the U.S., reported SolarWinds clients included parts of the British government, including the
Home Office,
National Health Service
The National Health Service (NHS) is the umbrella term for the publicly funded healthcare systems of the United Kingdom (UK). Since 1948, they have been funded out of general taxation. There are three systems which are referred to using the " ...
, and
signals intelligence
Signals intelligence (SIGINT) is intelligence-gathering by interception of '' signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication ...
agencies; the
North Atlantic Treaty Organization
The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two No ...
(NATO); the
European Parliament
The European Parliament (EP) is one of the legislative bodies of the European Union and one of its seven institutions. Together with the Council of the European Union (known as the Council and informally as the Council of Ministers), it adop ...
; and likely
AstraZeneca
AstraZeneca plc () is a British-Swedish multinational pharmaceutical and biotechnology company with its headquarters at the Cambridge Biomedical Campus in Cambridge, England. It has a portfolio of products for major diseases in areas includ ...
.
FireEye said that additional government, consulting, technology, telecom and extractive entities in North America, Europe, Asia and the Middle East may also have been affected.
Through a manipulation of software keys, the hackers were able to access the email systems used by the Treasury Department's highest-ranking officials. This system, although unclassified, is highly sensitive because of the Treasury Department's role in making
decisions that move the market, as well as decisions on
economic sanction
Economic sanctions are commercial and financial penalties applied by one or more countries against a targeted self-governing state, group, or individual. Economic sanctions are not necessarily imposed because of economic circumstances—they ma ...
s and interactions with the
Federal Reserve
The Federal Reserve System (often shortened to the Federal Reserve, or simply the Fed) is the central banking system of the United States of America. It was created on December 23, 1913, with the enactment of the Federal Reserve Act, after a ...
.
Simply downloading a compromised version of Orion was not necessarily sufficient to result in a data breach; further investigation was required in each case to establish whether a breach resulted.
These investigations were complicated by: the fact that the attackers had in some cases removed evidence;
the need to maintain separate secure networks as organizations' main networks were assumed to be compromised;
and the fact that Orion was itself a network monitoring tool, without which users had less visibility of their networks.
As of mid-December 2020, those investigations were ongoing.
As of mid-December 2020, U.S. officials were still investigating what was stolen in the cases where breaches had occurred, and trying to determine how it could be used.
Commentators said that the information stolen in the attack would increase the perpetrator's influence for years to come.
Possible future uses could include attacks on hard targets like the
CIA
The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
and NSA,
or using blackmail to recruit spies.
Cyberconflict professor
Thomas Rid
Thomas Rid (born 1975) is a political scientist best known for his work on the history and risks of information technology in conflict. He is Professor of Strategic Studies at the Paul H. Nitze School of Advanced International Studies. Previously h ...
said the stolen data would have myriad uses.
He added that the amount of data taken was likely to be many times greater than during
Moonlight Maze
Moonlight Maze was a 1999 US government investigation into a massive data breach of classified information. It started in 1996 and affected NASA, the Pentagon, military contractors, civilian academics, the DOE, and numerous other American govern ...
, and if printed would form a stack far taller than the
Washington Monument
The Washington Monument is an obelisk shaped building within the National Mall in Washington, D.C., built to commemorate George Washington, once commander-in-chief of the Continental Army (1775–1784) in the American Revolutionary War and ...
.
Even where data was not exfiltrated, the impact was significant.
The
Cybersecurity and Infrastructure Security Agency
The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security (DHS) that is responsible for strengthening cybersecurity and infrastructure protection across all levels of government ...
(CISA) advised that affected devices be rebuilt from trusted sources, and that all credentials exposed to SolarWinds software should be considered compromised and should therefore be reset.
Anti-malware companies additionally advised searching
log file
In computing, logging is the act of keeping a log of events that occur in a computer system, such as problems, errors or just information on current operations. These events may occur in the operating system or in other software. A message or ...
s for specific
indicators of compromise.
However, it appeared that the attackers had deleted or altered records, and may have modified network or system settings in ways that could require manual review.
Former
Homeland Security Advisor
The Assistant to the President for Homeland Security and Counterterrorism, commonly referred to as the Homeland Security Advisor and formerly the Deputy National Security Advisor for Homeland Security and Counterterrorism, is a senior aide in the ...
Thomas P. Bossert
Thomas P. Bossert (born March 25, 1975) is an American lawyer and former Homeland Security Advisor to U.S. President Donald Trump. He is an ABC News Homeland Security analyst.
Immediately before, he was a fellow at the Atlantic Council and pr ...
warned that it could take years to evict the attackers from US networks, leaving them able to continue to monitor, destroy or tamper with data in the meantime.
Harvard's
Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Ce ...
, and
NYU
New York University (NYU) is a private research university in New York City. Chartered in 1831 by the New York State Legislature, NYU was founded by a group of New Yorkers led by then-Secretary of the Treasury Albert Gallatin.
In 1832, the ...
's Pano Yannakogeorgos, founding dean of the Air Force Cyber College, said that affected networks may need to be replaced completely.
The Justice Department disclosed in July 2021 that 27 of its federal prosecutors' offices around the country had been affected, including 80% of Microsoft email accounts breached in four New York offices. Two of the offices, in Manhattan and Brooklyn, handle many prominent investigations of white-collar crime, as well as of people close to former president Trump.
List of confirmed connected data breaches
U.S. federal government
U.S. state and local governments
Private sector
Investigations and responses
Technology companies and business
On December 8, 2020, before other organizations were known to have been breached, FireEye published countermeasures against the red team tools that had been stolen from FireEye.
On December 15, 2020, Microsoft announced that SUNBURST, which only affects Windows platforms, had been added to Microsoft's malware database and would, from December 16 onwards, be detected and quarantined by
Microsoft Defender
Microsoft Defender Antivirus (formerly Windows Defender) is an anti-malware component of Microsoft Windows. It was first released as a downloadable free anti-spyware program for Windows XP and was shipped with Windows Vista and Windows 7. It ha ...
.
GoDaddy
GoDaddy Inc. is an American publicly traded Internet domain registrar and web hosting company headquartered in Tempe, Arizona, and incorporated in Delaware.
, GoDaddy has more than 21 million customers and over 6,600 employees worldwide. The ...
handed ownership to
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
of a
command-and-control domain used in the attack, allowing Microsoft to activate a
killswitch
A kill switch, also known as an emergency stop (E-stop), emergency off (EMO) and as an emergency power off (EPO), is a safety mechanism used to shut off machinery in an emergency, when it cannot be shut down in the usual manner. Unlike a normal ...
in the SUNBURST malware, and to
discover which SolarWinds customers were infected.
On December 14, 2020, the
CEO
A chief executive officer (CEO), also known as a central executive officer (CEO), chief administrator officer (CAO) or just chief executive (CE), is one of a number of corporate executives charged with the management of an organization especiall ...
s of several American utility companies convened to discuss the risks posed to the power grid by the attacks.
On December 22, 2020, the
North American Electric Reliability Corporation
The North American Electric Reliability Corporation (NERC) is a nonprofit corporation based in Atlanta, Georgia, and formed on March 28, 2006, as the successor to the North American Electric Reliability Council (also known as NERC). The original ...
asked electricity companies to report their level of exposure to Solarwinds software.
SolarWinds unpublished its featured customer list after the hack,
although as of December 15, cybersecurity firm GreyNoise Intelligence said SolarWinds had not removed the infected software updates from its distribution server.
Around January 5, 2021, SolarWinds investors filed a class action lawsuit against the company in relation to its security failures and subsequent fall in share price.
Soon after, SolarWinds hired a new cybersecurity firm co-founded by Krebs.
The
Linux Foundation
The Linux Foundation (LF) is a non-profit technology consortium founded in 2000 as a merger between Open Source Development Labs and the Free Standards Group to standardize Linux, support its growth, and promote its commercial adoption. Addi ...
pointed out that if Orion had been
open source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
, users would have been able to audit it, including via
reproducible build
Reproducible builds, also known as deterministic compilation, is a process of compiling software which ensures the resulting binary code can be reproduced. Source code compiled using deterministic compilation will always output the same binary.
...
s, making it much more likely that the malware payload would have been spotted.
U.S. government
On December 18, 2020, U.S. Secretary of State Mike Pompeo said that some details of the event would likely be classified so as not to become public.
Security agencies
On December 12, 2020, a United States National Security Council, National Security Council (NSC) meeting was held at the White House to discuss the breach of federal organizations.
On December 13, 2020, CISA issued an emergency directive asking federal agencies to disable the SolarWinds software, to reduce the risk of additional intrusions, even though doing so would reduce those agencies' ability to monitor their computer networks.
The Russian government said that it was not involved in the attacks.
On December 14, 2020, the Department of Commerce confirmed that it had asked the CISA and the Federal Bureau of Investigation, FBI to investigate.
The NSC activated Presidential Policy Directive 41, an Presidency of Barack Obama, Obama-era emergency plan, and convened its Cyber Response Group.
The U.S. Cyber Command threatened swift retaliation against the attackers, pending the outcome of investigations.
The DOE helped to compensate for a staffing shortfall at CISA by allocating resources to help the Federal Energy Regulatory Commission (FERC) recover from the cyberattack.
The FBI, CISA, and the Office of the Director of National Intelligence (ODNI) formed a Cyber Unified Coordination Group (UCG) to coordinate their efforts.
On December 24, 2020, CISA said state and local government networks, in addition to federal ones, and other organizations, had been impacted by the attack, but did not provide further details.
Congress
The Senate Armed Services Committee's cybersecurity subcommittee was briefed by Defense Department officials.
The United States House Committee on Homeland Security, House Committee on Homeland Security and United States House Committee on Oversight and Reform, House Committee on Oversight and Reform announced an investigation.
Marco Rubio
Marco Antonio Rubio (born May 28, 1971) is an American politician and lawyer serving as the senior United States senator from Florida, a seat he has held since 2011. A member of the Republican Party, he served as Speaker of the Florida House ...
, acting chair of the
Senate Intelligence Committee
The United States Senate Select Committee on Intelligence (sometimes referred to as the Intelligence Committee or SSCI) is dedicated to overseeing the United States Intelligence Community—the agencies and bureaus of the federal government of ...
, said the U.S. must retaliate, but only once the perpetrator is certain. The committee's vice-chairman,
Mark Warner
Mark Robert Warner (born December 15, 1954) is an American businessman and politician serving as the senior United States senator from Virginia, a seat he has held since 2009. A member of the Democratic Party, Warner served as the 69th govern ...
, criticized President Trump for failing to acknowledge or react to the hack.
Senator Ron Wyden called for mandatory security reviews of software used by federal agencies.
On December 22, 2020, after U.S. Treasury Secretary Steven Mnuchin told reporters that he was "completely on top of this", the Senate Finance Committee was briefed by Microsoft that dozens of Treasury email accounts had been breached, and the attackers had accessed systems of the Treasury's Departmental Offices division, home to top Treasury officials.
Senator Wyden said that the briefing showed that the Treasury "still does not know all of the actions taken by hackers, or precisely what information was stolen".
On December 23, 2020, Senator Bob Menendez asked the State Department to end its silence about the extent of its breach, and Senator Richard Blumenthal asked the same of the Veterans Administration.
The judiciary
The Administrative Office of the United States Courts initiated an audit, with DHS, of the U.S. Judiciary's CM/ECF, Case Management/Electronic Case Files (CM/ECF) system.
It stopped accepting highly sensitive court documents to the CM/ECF, requiring those instead to be accepted only in paper form or on Air gap (networking), airgapped devices.
President Trump
President
Donald Trump
Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who served as the 45th president of the United States from 2017 to 2021.
Trump graduated from the Wharton School of the University of ...
made no comment on the hack for days after it was reported, leading Senator Mitt Romney to decry his "silence and inaction".
On December 19, Trump publicly addressed the attacks for the first time; he downplayed the hack, contended that the media had overblown the severity of the incident, said that "everything is well under control"; and proposed, without evidence, that China, rather than Russia, might be responsible for the attack. Trump then pivoted to insisting that he had won the 2020 presidential election.
[Justin Sink]
Trump Downplays Huge Hack Tied to Russia, Suggests China
Bloomberg News (December 19, 2020). He speculated, without evidence, that the attack might also have involved a "hit" on voting machines, part of a Disputes surrounding the 2020 United States presidential election results, long-running campaign by Trump to falsely assert that he won the 2020 election. Trump's claim was rebutted by former CISA director Chris Krebs, who pointed out that Trump's claim was not possible.
Adam Schiff, chair of the United States House Permanent Select Committee on Intelligence, House Intelligence Committee, described Trump's statements as dishonest, calling the comment a "scandalous betrayal of our national security" that "sounds like it could have been written in the Kremlin."[
Former ]Homeland Security Advisor
The Assistant to the President for Homeland Security and Counterterrorism, commonly referred to as the Homeland Security Advisor and formerly the Deputy National Security Advisor for Homeland Security and Counterterrorism, is a senior aide in the ...
Thomas P. Bossert
Thomas P. Bossert (born March 25, 1975) is an American lawyer and former Homeland Security Advisor to U.S. President Donald Trump. He is an ABC News Homeland Security analyst.
Immediately before, he was a fellow at the Atlantic Council and pr ...
said, "President Trump is on the verge of leaving behind a federal government, and perhaps a large number of major industries, compromised by the Russian government," and noted that congressional action, including via the National Defense Authorization Act would be required to mitigate the damage caused by the attacks.
President Biden
Then President-elect of the United States, president-elect Joe Biden said he would identify and penalize the attackers. Biden's incoming White House Chief of Staff, chief of staff, Ron Klain, said the Presidency of Joe Biden, Biden administration's response to the hack would extend beyond sanctions. On December 22, 2020, Biden reported that his transition team was still being denied access to some briefings about the attack by Trump administration officials.
In January 2021, Biden named appointees for two relevant White House positions: Elizabeth Sherwood-Randall as homeland security adviser, and Anne Neuberger as deputy national security adviser for cyber and emerging technology.
In March 2021, the Biden administration expressed growing concerns over the hack, and White House White House Press Secretary, Press Secretary Jen Psaki called it “an active threat”. Meanwhile ''The New York Times'' reported that the US government was planning economic sanctions as well as "a series of clandestine actions across Russian networks" in retaliation.
On April 15, 2021, the United States expelled 10 Russian diplomats and issued sanctions against 6 Russian companies that support its cyber operations, as well as 32 individuals and entities for their role in the hack and in Russian interference in the 2020 United States elections.
Rest of the world
NATO said that it was "currently assessing the situation, with a view to identifying and mitigating any potential risks to our networks." On December 18, the United Kingdom National Cyber Security Centre said that it was still establishing the attacks' impact on the UK. The UK and Irish cybersecurity agencies published alerts targeting SolarWinds customers.
On December 23, 2020, the UK Information Commissioner's Office – a national privacy authority – told UK organizations to check immediately whether they were impacted.
On December 24, 2020, the Canadian Centre for Cyber Security asked SolarWinds Orion users in Canada to check for system compromises.
Cyber espionage or cyberattack?
The attack prompted a debate on whether the hack should be treated as cyber espionage, or as a cyberattack
A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
constituting an act of war. Most current and former U.S. officials considered the 2020 Russian hack to be a "stunning and distressing feat of espionage" but not a cyberattack because the Russians did not appear to destroy or manipulate data or cause physical damage (for example, to the electrical grid). Erica Borghard of the Atlantic Council and Columbia University, Columbia's Arnold A. Saltzman Institute of War and Peace Studies, Saltzman Institute and Jacquelyn Schneider of the Hoover Institution and Naval War College argued that the breach was an act of espionage that could be responded to with "arrests, diplomacy, or counterintelligence" and had not yet been shown to be a cyberattack, a classification that would legally allow the U.S. to respond with force. Law professor Jack Goldsmith wrote that the hack was a damaging act of cyber-espionage but "does not violate international law or norms" and wrote that "because of its own practices, the U.S. government has traditionally accepted the legitimacy of foreign governmental electronic spying in U.S. government networks." Law professor Michael Schmitt concurred, citing the ''Tallinn Manual''.
By contrast, Microsoft president Brad Smith (American lawyer), Brad Smith termed the hack a cyberattack, stating that it was "not 'espionage as usual,' even in the digital age" because it was "not just an attack on specific targets, but on the trust and reliability of the world's critical infrastructure." U.S. Senator Richard J. Durbin
Richard Joseph Durbin (born November 21, 1944) is an American lawyer and politician serving as the senior United States senator from Illinois, a seat he has held since 1997. A member of the Democratic Party, Durbin has served as the Senate De ...
(D-IL) described the attack as tantamount to a declaration of war.
Debate on possible U.S. responses
Writing for Wired (magazine), ''Wired'', Borghard and Schneider opined that the U.S. "should continue to build and rely on strategic deterrence to convince states not to weaponize the cyber intelligence they collect". They also stated that because deterrence may not effectively discourage cyber-espionage attempts by threat actors, the U.S. should also focus on making cyber-espionage less successful through methods such as enhanced cyber-defenses, better information-sharing, and "defending forward" (reducing Russian and Chinese offensive cyber-capabilities).
Writing for ''The Dispatch'', Goldsmith wrote that the failure of defense and deterrence strategies against cyber-intrusion should prompt consideration of a "mutual restraint" strategy, "whereby the United States agrees to curb certain activities in foreign networks in exchange for forbearance by our adversaries in our networks."
Cybersecurity author Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Ce ...
advocated against retaliation or increases in offensive capabilities, proposing instead the adoption of a defense-dominant strategy and ratification of the Internet governance#Paris Call for Trust and Security in Cyberspace, Paris Call for Trust and Security in Cyberspace or the Global Commission on the Stability of Cyberspace.
In the ''New York Times'', Paul Kolbe, former CIA agent and director of the Intelligence Project at Harvard's Belfer Center for Science and International Affairs, echoed Schneier's call for improvements in the U.S.'s cyberdefenses and international agreements. He also noted that the US is engaged in similar operations against other countries in what he described as an ambient cyber-conflict.
See also
* Cyberwarfare in the United States
* Cyberwarfare by Russia
* EternalBlue
* Global surveillance disclosures (2013–present)
* List of data breaches
* Moonlight Maze
Moonlight Maze was a 1999 US government investigation into a massive data breach of classified information. It started in 1996 and affected NASA, the Pentagon, military contractors, civilian academics, the DOE, and numerous other American govern ...
* Office of Personnel Management data breach
* Security dilemma
* The Shadow Brokers
* 2008 cyberattack on United States
* 2021 Microsoft Exchange Server data breach
References
External links
SolarWinds Security Advisory
GuidePoint Security Analysis
Russian SVR Targets U.S. and Allied Networks
(pdf file)
A 'Worst Nightmare' Cyberattack: The Untold Story Of The SolarWinds Hack
by Dina Temple-Raston, Friday, April 16, 2021
NPR text only version
{{Hacking in the 2020s
2020 in the United States
Cyberattacks
Data breaches in the United States
2020 in computing
Hacking in the 2020s