Both the US agency and Microsoft play down the danger, claiming they have activated the attack’s kill switch.
Microsoft and several US government agencies were caught in a massive hack after Russian spies managed to access SolarWinds’ monitoring software, Orion. Hackers added a trojan inside the monitoring tool, which gave them access to pretty much everything they needed: access the victim’s network, execute commands and read emails.
Microsoft representatives admitted that the company is an Orion user and had installed the infected version. However, there weren’t any signs that would point to unauthorized access of users’ data.
“Like other SolarWinds customers, we have been actively looking for indicators of this actor and can confirm that we detected malicious SolarWinds binaries in our environment, which we isolated and removed,” Frank Shaw, Microsoft’s comms veep, said in a statement. “We have found no evidence of access to production services or customer data. Our investigations, which are ongoing, have found absolutely no indicators that our systems were used to attack others.”
On the other hand, it is reported that the US government’s Dept of Energy’s National Nuclear Security Administration, which oversees the country’s nuclear stockpile, was also hacked by the Orion backdoor. A DOE spokesperson said: “At this point, the investigation has found that the malware has been isolated to business networks only, and has not impacted the mission essential national security functions of the department, including the National Nuclear Security Administration.”
The network monitoring software is used by 300k customers, of which at least 18k have downloaded and installed the infected binaries. These clients range from US and UK government institutions to Fortune 500 companies.
FireEye, a private company who was investigating the Orion hack, worked with GoDaddy and Microsoft to remotely trigger the kill switch that was implemented in the trojan.
Check the source.
- Fresh COVID-19 Phish: Cybercrooks Impersonate Pfizer In Request For Quotation ScamBad guys exploiting the COVID-19 pandemic is nothing new under the sun. However, the newest highly-targeted phishing campaign impersonating […]
- Ransomware Attack Hits McMenamins; 2,700 Employee Records Potentially LeakedA recent attack targeted McMenamins, a popular family-run chain of hotels, restaurants, and breweries. The company is still experiencing […]
- The Number Of Double-Extortion Ransomware Victims Sees Massive 935% Increase In 2021A jaw-dropping three-digit spike in the number of companies hit with double-extortion ransomware attacks, most likely due to easy […]
- Cybercrooks Aiming To Take Over 1.6M WordPress Sites In Active AttackThreat actors are actively exploiting security flaws in four plugins and Epsilon themes to assign themselves administrative accounts and […]
- Cuba Ransomware Group Raked In $44M In Payouts, The FBI SaysThe Cuba ransomware gang is a wide range of tools and malware to launch and conduct attacks targeting organizations […]