Tuesday, April 1, 2025
HomeCyber AttackSolarWinds Hackers Accessed Emails of US Department of Homeland Security (DHS) Officials

SolarWinds Hackers Accessed Emails of US Department of Homeland Security (DHS) Officials

Published on

SIEM as a Service

Follow Us on Google News

Recently, the Homeland security officials (DHS) of the US department came to the list of the victim of the SolarWinds attack. However, the  DHS is the administrative department of the United States federal government.

This department is accountable for public safety, similar to the central ministries of other countries. After a proper investigation, the cybersecurity analysts knew that the cybercriminals had gained access to the email accounts of the key members of DHS, including secretary Chad Wolf.

According to the reports, the DHS is one of the latest victims of the SolarWinds Worldwide LLC hacking attack. The agency has again reported that they have been suspecting the Russian hacking group for this attack. 

The agency also asserted that the hackers had accessed the email accounts of all senior DHS officials, that also includes Chad Wolf, the secretary of Homeland Security.

New Disclosures

The security researchers, after knowing about the attack, concluded that this complex action professes a severe risk to critical infrastructures.

And this attack also indicates that its destruction will be complex, and as time passes, there will be more victims of this attack. Moreover, in this attack, various high-profile leaders of other agencies were also targeted by the threat actors. 

The list includes a member of the White House advisers and former Energy Department Secretary Dan Brouillette. Not only this, but the newly leaked information implies that all the damages were considerably worse than previously thought.

All these attacks have particularly revealed all kind of sensitive data. The analysts affirmed that the new data had not changed the policy of the White House, but the investigation is pointing that the threat actors that are responsible for this attack belong to Russia.  

Which Government Agencies Were Affected?

The government agencies that were affected in the SolarWinds hacking attack were mentioned below:-

  • Homeland Security, State, Commerce and Treasury.
  • The National Institutes of Health.
  • The National Nuclear Security Administration.
  • Energy department.
  • Commerce Department.
  • Treasury Department.

But, it’s still not confirmed that exactly how many companies and government departments have been affected or attacked by the SolarWinds hackers. But there was a report that has been stated by the cybersecurity analysts, which says that last month it was estimated that there were 18,000 companies that were attacked.  

The government agencies are trying their best to circumvent all these attacks; however, the US government had agreed that a total of nine federal agencies and nearly 100 private sector companies were involved in the attack.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Check Point Confirms Data Breach, Says Leaked Information is ‘Old’

Cybersecurity giant Check Point has confirmed that a recent post on a notorious dark...

CrushFTP Security Vulnerability Under Attack After PoC Release

A recently disclosed security vulnerability in CrushFTP, identified as CVE-2025-2825, has become the target...

CISA Warns of Cisco Smart Licensing Utility Credential Flaw Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a security advisory warning organizations...

Hackers Deploy 24,000 IPs to Breach Palo Alto Networks GlobalProtect

A wave of malicious activity targeting Palo Alto Networks PAN-OS GlobalProtect portals has been...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

DeBackdoor: A Framework for Detecting Backdoor Attacks in Deep Learning Models

Deep learning models, increasingly integral to safety-critical systems like self-driving cars and medical devices,...

Kuala Lumpur Airport Hit by Cyberattack, Hackers Demand $10M Ransom

Kuala Lumpur International Airport (KLIA), one of Southeast Asia's busiest airports, was hit by...

Blacklock Ransomware Infrastructure Breached, Revealing Planned Attacks

Resecurity, a prominent cybersecurity firm, has successfully exploited a vulnerability in the Data Leak...