NATIONAL NEWS

Tech Firms Say There’s Little Doubt Russia Behind Major Hack

Feb 23, 2021, 5:37 PM

SolarWinds CEO Sudhakar Ramakrishna attends a Senate Intelligence Committee hearing on Capitol Hill...

SolarWinds CEO Sudhakar Ramakrishna attends a Senate Intelligence Committee hearing on Capitol Hill on February 23, 2021 in Washington, DC. The hearing focused on the 2020 cyberattack that resulted in a series of major data breaches within several U.S. corporations and agencies and departments in the U.S. federal government. (Photo by Demetrius Freeman-Pool/Getty Images)

(Photo by Demetrius Freeman-Pool/Getty Images)

WASHINGTON (AP) — Leading technology companies said Tuesday that a months-long breach of corporate and government networks was so sophisticated, focused and labor-intensive that a nation had to be behind it, with all the evidence pointing to Russia.

In the first congressional hearing on the breach, representatives of technology companies involved in the response described a hack of almost breathtaking precision, ambition and scope. The perpetrators stealthily scooped up specific emails and documents on a target list from the U.S. and other countries.

“We haven’t seen this kind of sophistication matched with this kind of scale,” Microsoft President Brad Smith told the Senate Intelligence Committee.

Forensic investigators have estimated that at least 1,000 highly skilled engineers would have been required to develop the code that hijacked widely used network software from Texas-based SolarWinds to deploy malware around the world through a security update.

“We’ve seen substantial evidence that points to the Russian foreign intelligence agency and we have found no evidence that leads us anywhere else,” Smith said.

U.S. national security officials have also said Russia was likely responsible for the breach, and President Joe Biden’s administration is weighing punitive measures against Russia for the hack as well as other activities. Moscow has denied responsibility for the breach.

Officials have said the motive for the hack, which was discovered by private security company FireEye in December, appeared to be to gather intelligence. On what, they haven’t said.

At least nine government agencies and 100 private companies were breached, but what was taken has not been revealed.

White House press secretary Jen Psaki said Tuesday it would be “weeks not months” before the U.S. responds to Russia.

“We have asked the intelligence community to do further work to sharpen the attribution that the previous administration made about precisely how the hack occurred, what the extent of the damage is, and what the scope and scale of the intrusion is,” Psaki said. “And we’re still in the process of working that through now.”

FireEye CEO Kevin Mandia told the Senate that his company has had nearly 100 people working to study and contain the breach since they detected it, almost by accident, in December and alerted the U.S. government.

The hackers first quietly installed malicious code in October 2019 on targeted networks, but didn’t activate it to see if they could remain undetected. They returned in March and immediately began to steal the log-in credentials of people who were authorized to be on the network so they could have a “secret key” to move around at will, Mandia said.

Once detected “they vanished like ghosts,” he said.

“There’s no doubt in my mind that this was planned,” the security executive said. “The question really is where’s the next one, and when are we going to find it?”

Government agencies breached include the Treasury, Justice and Commerce departments, but the full list has not been publicly released. The president of Microsoft, which is working with FireEye on the response, said there are victims around the world, including in Canada, Mexico, Spain and the United Arab Emirates.

The panel, which also included Sudhakar Ramakrishna, the CEO of SolarWinds who took over the company after the hack occurred, and George Kurtz, the president and CEO of CrowdStrike, another leading security company, faced questions not just about how the breach occurred but also whether hacking victims need to be legally compelled to be forthcoming when they have been breached. Even now, three months after the breach was disclosed, the identity of most victims remains unknown.

Congress has considered in the past whether to require companies to report that they have been the victim of a hack, but it has triggered legal concerns, including whether they could be held liable by clients for the loss of data.

U.S. authorities are also considering whether to give additional resources and authority to the Cybersecurity and Infrastructure Agency or other agencies to be able to take a more forceful role in working to prevent future breaches.

Another measure that has been considered is to create a new agency, like the National Transportation Safety Board, that could quickly come in and evaluate a breach and determine whether there are problems that need to be fixed.

Sen. Ron Wyden, one of the most prominent voices on cyber issues in the Senate, warned that the U.S. must first make sure that government agencies breached in this incident have taken the required security measures.

“The impression that the American people might get from this hearing is that the hackers are such formidable adversaries that there was nothing that the American government or our biggest tech companies could have done to protect themselves,” said Wyden, an Oregon Democrat. “My view is that message leads to privacy-violating laws and billions of more taxpayer funds for cybersecurity.”

____

Associated Press writer Alan Suderman in Richmond, Virginia, contributed.

KSL 5 TV Live

National News

FILE - The Rev. Bill Farmer, center, speaks to members of the congregation during service at the Gr...

Peter Smith, Associated Press

United Methodists remove anti-gay language from their official teachings

The United Methodist Church overturned its 40-year ban on gay clergy Wednesday, marking a historic shift in the church’s stance on homosexuality.

4 hours ago

In this photo released by Xinhua News Agency, an aerial drone photo taken on May 2, 2024 shows resc...

Associated Press

Death toll jumps to at least 48 as a search continues in southern China highway collapse

The death toll from a collapsed highway in southeastern China climbed to 48 on Thursday as searchers dug for a second day through a treacherous and mountainous area.

5 hours ago

Joie Henney, 65, sits in 2019 with his emotional support alligator, Wally, at his home in York Have...

Sydney Bishop, CNN

Wally, the emotional support alligator once denied entry to a baseball game, is missing

A Pennsylvania man says his emotional support alligator named Wally has gone missing amid the coastal marshes of Georgia.

5 hours ago

Women of all ages should focus on strength training to help reduce risk of dementia, said exercise ...

Melanie Radzicki McManus, CNN

Women need to exercise and eat differently than men. Here’s how

Studies show women need to eat and exercise differently than men.

6 hours ago

A watch with "psywar" as its brand...

Lolita C. Baldor, Associated Press

Faceless people, invisible hands: New Army video aims to lure recruits for psychological operations

A haunting new video released in the early morning hours is the latest effort by the Army to lure soldiers to some of its more secretive units.

7 hours ago

This image provided by the Pennsylvania Attorney General's Office shows Heather Pressdee. The Penns...

Bruce Shipkowski, Associated Press

Guilty of multiple murders, nurse gets 3 consecutive terms of life in prison

A Pennsylvania nurse who administered lethal or potentially lethal doses of insulin to numerous patients has pleaded guilty to three counts of murder and other charges and been sentenced to life in prison.

8 hours ago

Sponsored Articles

Side view at diverse group of children sitting in row at school classroom and using laptops...

PC Laptops

5 Internet Safety Tips for Kids

Read these tips about internet safety for kids so that your children can use this tool for learning and discovery in positive ways.

Women hold card for scanning key card to access Photocopier Security system concept...

Les Olson

Why Printer Security Should Be Top of Mind for Your Business

Connected printers have vulnerable endpoints that are an easy target for cyber thieves. Protect your business with these tips.

Modern chandelier hanging from a white slanted ceiling with windows in the backgruond...

Lighting Design

Light Up Your Home With These Top Lighting Trends for 2024

Check out the latest lighting design trends for 2024 and tips on how you can incorporate them into your home.

Technician woman fixing hardware of desktop computer. Close up....

PC Laptops

Tips for Hassle-Free Computer Repairs

Experiencing a glitch in your computer can be frustrating, but with these tips you can have your computer repaired without the stress.

Close up of finger on keyboard button with number 11 logo...

PC Laptops

7 Reasons Why You Should Upgrade Your Laptop to Windows 11

Explore the benefits of upgrading to Windows 11 for a smoother, more secure, and feature-packed computing experience.

Stylish room interior with beautiful Christmas tree and decorative fireplace...

Lighting Design

Create a Festive Home with Our Easy-to-Follow Holiday Prep Guide

Get ready for festive celebrations! Discover expert tips to prepare your home for the holidays, creating a warm and welcoming atmosphere for unforgettable moments.

Tech Firms Say There’s Little Doubt Russia Behind Major Hack