Thursday, March 28, 2024

FBI, CISA, ODNI, and NSA Says Russian Threat Actors Behind SolarWinds Hack

The Federal Bureau of Investigation (FBI), the Cybersecurity & Infrastructure Agency (CISA) and the Office of the Director of National Intelligence (ODNI) along with support from the National Security Agency (NSA) have joined hands to form the Cyber Unified Coordination Group (UCG), to investigate the cyberattacks against the federal government agencies.

The UCG would investigate the attacks and the basis of their investigation would recommend remedial measures for the same.

As we had reported earlier, it is believed that the Advanced Persistent Threat (APT) actor is mostly of Russian origin. At this point in time, the activity purely remains as an intelligence collection activity.

SolarWinds had earlier reported that atleast 18,000 companies may have fallen victim to the attack on its Orion products. However, the UCG believes that only a small fraction of these companies have been compromised by any follow-on activity on their systems. Till date fewer than ten government agencies fall in the latter category.

The FBI’s investigation is primarily directed at identifying the victims, collecting evidence, analyzing the evidence to determine further attribution, and sharing results with all concerned.

Whereas the CISA is more focused and directed towards rapidly sharing the information with the government and other private partners. CISA had earlier developed a free tool to detect unusual and malicious activity related to this attack.

The CISA had also issued a directive to the affected government agencies, asking them to update, with immediate effect, to the latest version of SolarWinds Orion products or halt working on them until the update is done.

ODNI’s role is to ensure the UCG has the access to the latest news and developments by coordinating with Intelligence Community. ODNI also provides situational awareness to key stakeholders and address knowledge and intelligence gaps.

The NSA is supporting the UCG by providing intelligence, cybersecurity expertise, and actionable guidance to the UCG partners, as well as National Security Systems, Department of Defense, and Defense Industrial Base system owners.

NSA’s engagement with both the UCG and industry partners is focused on assessing the scale and scope of the incident, as well as providing technical mitigation measures. The UCG has been working hard, including through the festive period, to identify and remediate the doings of the attackers.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles