Hem
Fireeyes vd Kevin Mandia, Solarwinds vd Sudhakar Ramakrishna och Microsofts ordförande Brad Smith frågades ut av senatens underrättelsekommitté om det omfattade Solarwindshacket, som uppdagades förra året. (Drew Angerer / TT NYHETSBYRÅN)

Microsoft: 1 000 hackare krävdes i Solarwinds-attack

Det krävdes minst 1 000 mjukvaruingenjörer i disciplinerat samarbete för att genomföra det enorma Solarwinds-angreppet som uppdagades förra året. Det uppgav Microsofts ordförande Brad Smith i en utfrågning i den amerikanska senatens underrättelsekommitté på tisdagen, skriver AFP.

– Vi har frågat oss själva hur många ingenjörer vi tror arbetade med den här samlade ansträngningen. Och svaret vi kom fram till var … åtminstone 1 000 väldigt skickliga, begåvade ingenjörer.

Enligt Smith finns det ”ingen annan organisation än den ryska underrättelsetjänsten” som har möjligheter att koordinera ett angrepp av den kalibern. Ryssland har upprepade gånger nekat till anklagelserna vid tidigare tillfällen.

Sammanlagt beräknas över 100 företag – däribland Microsoft – ha hackats i angreppet och ytterligare 18 000 lämnats med sårbarheter.

bakgrund
 
Solarwinds-attacken
Wikipedia (en)
In 2020, a major cyberattack by a group backed by a foreign government penetrated thousands of organizations globally including multiple parts of the United States federal government, leading to a series of data breaches. The hacking group Cozy Bear (APT29), backed by the Russian intelligence agency SVR, was identified as the likely culprit. The cyberattack and data breach were reported to be among the worst cyber-espionage incidents ever suffered by the U.S., due to the sensitivity and high profile of the targets and the long duration (eight to nine months) in which the hackers had access. Within days of its discovery, at least 200 organizations around the world had been reported to be affected by the attack, and some of these may also have suffered data breaches. Affected organizations worldwide included NATO, the U.K. government, the European Parliament, Microsoft and others.The attack, which had gone undetected for months, was first publicly reported on December 13, 2020, and was initially only known to have affected the U.S. Treasury Department and the National Telecommunications and Information Administration (NTIA), part of the U.S. Department of Commerce. In the following days, more departments and private organizations reported breaches.The cyberattack that led to the breaches began no later than March 2020. The attackers exploited software or credentials from at least three U.S. firms: Microsoft, SolarWinds, and VMware. A supply chain attack on Microsoft cloud services provided one way for the attackers to breach their victims, depending upon whether the victims had bought those services through a reseller. A supply chain attack on SolarWinds's Orion software, widely used in government and industry, provided another avenue, if the victim used that software. Flaws in Microsoft and VMware products allowed the attackers to access emails and other documents, and to perform federated authentication across victim resources via single sign-on infrastructure.In addition to the theft of data, the attack caused costly inconvenience to tens of thousands of SolarWinds customers, who had to check whether they had been breached, and had to take systems offline and begin months-long decontamination procedures as a precaution. U.S. Senator Richard J. Durbin described the cyberattack as tantamount to a declaration of war. President Donald Trump was silent for days after the attack, before suggesting that China, not Russia, might have been responsible for it, and that "everything is well under control".
Omni är politiskt obundna och oberoende. Vi strävar efter att ge fler perspektiv på nyheterna. Har du frågor eller synpunkter kring vår rapportering? Kontakta redaktionen