Thursday, November 14, 2024
HomeCyber AttackSolarWinds Hackers Accessed Emails of US Department of Homeland Security (DHS) Officials

SolarWinds Hackers Accessed Emails of US Department of Homeland Security (DHS) Officials

Published on

Malware protection

Recently, the Homeland security officials (DHS) of the US department came to the list of the victim of the SolarWinds attack. However, the  DHS is the administrative department of the United States federal government.

This department is accountable for public safety, similar to the central ministries of other countries. After a proper investigation, the cybersecurity analysts knew that the cybercriminals had gained access to the email accounts of the key members of DHS, including secretary Chad Wolf.

According to the reports, the DHS is one of the latest victims of the SolarWinds Worldwide LLC hacking attack. The agency has again reported that they have been suspecting the Russian hacking group for this attack. 

- Advertisement - SIEM as a Service

The agency also asserted that the hackers had accessed the email accounts of all senior DHS officials, that also includes Chad Wolf, the secretary of Homeland Security.

New Disclosures

The security researchers, after knowing about the attack, concluded that this complex action professes a severe risk to critical infrastructures.

And this attack also indicates that its destruction will be complex, and as time passes, there will be more victims of this attack. Moreover, in this attack, various high-profile leaders of other agencies were also targeted by the threat actors. 

The list includes a member of the White House advisers and former Energy Department Secretary Dan Brouillette. Not only this, but the newly leaked information implies that all the damages were considerably worse than previously thought.

All these attacks have particularly revealed all kind of sensitive data. The analysts affirmed that the new data had not changed the policy of the White House, but the investigation is pointing that the threat actors that are responsible for this attack belong to Russia.  

Which Government Agencies Were Affected?

The government agencies that were affected in the SolarWinds hacking attack were mentioned below:-

  • Homeland Security, State, Commerce and Treasury.
  • The National Institutes of Health.
  • The National Nuclear Security Administration.
  • Energy department.
  • Commerce Department.
  • Treasury Department.

But, it’s still not confirmed that exactly how many companies and government departments have been affected or attacked by the SolarWinds hackers. But there was a report that has been stated by the cybersecurity analysts, which says that last month it was estimated that there were 18,000 companies that were attacked.  

The government agencies are trying their best to circumvent all these attacks; however, the US government had agreed that a total of nine federal agencies and nearly 100 private sector companies were involved in the attack.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Windows 0-Day Exploited in Wild with Single Right Click

A newly discovered zero-day vulnerability, CVE-2024-43451, has been actively exploited in the wild, targeting Windows...

Automating Identity and Access Management for Modern Enterprises

Keeping track of who has access and managing their permissions has gotten a lot...

Finding The Right E-Commerce Platform – Comparing Reselling Solutions

If you’re looking to make some extra cash or to start a business, you...

Fortinet Patches Critical Flaws That Affected Multiple Products

Fortinet, a leading cybersecurity provider, has issued patches for several critical vulnerabilities impacting multiple...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine

Weaponized Linux virtual machines are used for offensive cybersecurity purposes, such as "penetration testing"...

APT36 Hackers Attacking Windows Deevices With ElizaRAT

APT36, a sophisticated threat actor, has been actively targeting Indian entities with advanced malware...

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...