/* ---- Google Analytics Code Below */

Wednesday, January 06, 2021

New Learning on SolarWinds

Schneier summarizes the NYT detailed article on the SolarWinds hack.   The NYT article is firewalled, and the Schneier article also includes a number of useful comments by readers.  Continue to follow this as it relates to work under way. 

Latest on the SVR’s SolarWinds Hack  by Bruce Schneier

The New York Times has an in-depth article on the latest information about the SolarWinds hack (not a great name, since it’s much more far-reaching than that).

Interviews with key players investigating what intelligence agencies believe to be an operation by Russia’s S.V.R. intelligence service revealed these points:

The breach is far broader than first believed. Initial estimates were that Russia sent its probes only into a few dozen of the 18,000 government and private networks they gained access to when they inserted code into network management software made by a Texas company named SolarWinds. But as businesses like Amazon and Microsoft that provide cloud services dig deeper for evidence, it now appears Russia exploited multiple layers of the supply chain to gain access to as many as 250 networks.

The hackers managed their intrusion from servers inside the United States, exploiting legal prohibitions on the National Security Agency from engaging in domestic surveillance and eluding cyberdefenses deployed by the Department of Homeland Security  ....  (much more below at link) ... ' 

No comments: