A Real Life Cyber Nightmare - The Solarwinds Attack
In
the Spring of 2021, Solarwinds, a network monitoring software was found to be
the source of one of the biggest cyber security breaches in history (Temple-Raston,
2021). Hackers believed to be backed by the Russian Intelligence service took
full advantage of the software update release cycle to hide a snippet of code
inside of the “factory sealed,” released code. From here the simple piece of
code was delivered to companies such as Microsoft, Intel, Cisco, and multiple
federal agencies such as the Treasury, the Justice and Energy departments, and
even the Pentagon.
This
tiny piece of code at first simply captured the IP address and a thumbnail profile
of the potential target and created a backdoor within the system. For this
attack to work the target must be attached to the internet. It did not work on
targets that were stand alone, or with no internet connection. Once installed, the
backdoor would wait up to two weeks before it would actually become active in
the infected host (Temple-Raston, 2021). According to Christopher Krebs, who’s
in charge of the office responsible for protecting government networks, said
that 90 to 95% of cyber stacks are based off of previously known techniques but
this attack was so successful because it was a new type of attack.
The
extent of the damage from this attack is still somewhat unknown. The hackers
had open access to American computer networks for 9 months before being
detected and halted (Temple-Raston, 2021). It has not been determined if the
hackers were simply reading emails during that time, or if they were planning
something more sinister for use in the future. It is also estimated that
approximately 100 companies and around a dozen government agencies were
compromised during this time, including CISA, the Cybersecurity and
Infrastructure Security Agency at the Department of Homeland Security whose job
it is to protect federal computer networks from cyber-attacks (Temple-Raston,
2021).
The
code took advantage of the normal software development process to inject a tainted
temporary update file into the Solarwinds software update while the known good
code was compiling. It was during the software compiling phase when the malicious
code told the machine to swap the Solarwinds temporary file with theirs. The
hackers used a bait-and-switch method to make this a successful hack. Understanding
that companies like Solarwinds audit their code before building a software
update to make sure everything is genuine, the hackers waited until the last
possible second when the code went from human readable source code to computer readable
executable code (Temple-Raston, 2021). There are many counter measures that
will be put into place after this case has been thoroughly studied and further
understood. Anne Neuberger, the Deputy national security advisor for cyber and
emerging technology in charge of the Solarwinds attack is already working on an
order that implements many new measures such as: requiring companies that do
business with the U.S. to adhere to certain software standards, requiring data
encryption across their system, and even implementing an air-gap to their “build-systems”
and build processes to keep them from ever touching the internet.
I
don’t believe that there were actual known gaps in the enterprise security plan
that were missed in this case. This was a new, unknown, intelligent code that
hasn’t been seen before, and because of that, I believe enterprise security
plans will be updated to protect against this type of attack in the future. The
scariest aspect of this attack is that it is still very much unknown what data
might have been stolen, what additional backdoors may have been opened, or what
orphaned malicious code might still be lingering on these systems. It is hard
for cyber-security experts to believe an attack as beautifully orchestrated
like this one would have been deployed with little intent to do further harm.
The fear is that in the future, the true extent of this attack will be made
clear and the impacts will be felt for a long time.
References
Temple-Raston, D. (2021,
April 16). A 'worst nightmare' cyberattack: The untold story of the solarwinds
hack. NPR. Retrieved December 16, 2021, from
https://www.npr.org/2021/04/16/985439655/a-worst-nightmare-cyberattack-the-untold-story-of-the-solarwinds-hack
Comments
Post a Comment