229
submitted 4 months ago by girlfreddy@lemmy.ca to c/news@lemmy.world

After Russian intelligence launched one of the most devastating cyber espionage attacks in history against U.S. government agencies, the Biden administration set up a new board and tasked it to figure out what happened — and tell the public.

State hackers had infiltrated SolarWinds, an American software company that serves the U.S. government and thousands of American companies. The intruders used malicious code and a flaw in a Microsoft product to steal intelligence from the National Nuclear Security Administration, National Institutes of Health and the Treasury Department in what Microsoft President Brad Smith called “the largest and most sophisticated attack the world has ever seen.”

The president issued an executive order establishing the Cyber Safety Review Board in May 2021 and ordered it to start work by reviewing the SolarWinds attack.

But for reasons that experts say remain unclear, that never happened.

Nor did the board probe SolarWinds for its second report.

A full, public accounting of what happened in the Solar Winds case would have been devastating to Microsoft. ProPublica recently revealed that Microsoft had long known about — but refused to address — a flaw used in the hack. The tech company’s failure to act reflected a corporate culture that prioritized profit over security and left the U.S. government vulnerable, a whistleblower said.

top 17 comments
sorted by: hot top controversial new old
[-] catloaf@lemm.ee 40 points 4 months ago

The body of the article seems to undermine the headline. They didn't generate a specific report, no, but they had previously studied this attack, and had included it in another report. And GAO accepted this, instead of making them redo that work. I'm not sure that this is necessarily a problem.

[-] Clusterfck@lemmy.sdf.org 10 points 4 months ago

So does that mean this article is criticizing the government for NOT spending more money to create a second report that contained all the information from another report?

[-] catloaf@lemm.ee 9 points 4 months ago
[-] girlfreddy@lemmy.ca 2 points 4 months ago

they had previously studied this attack

I don't see that stated in the article. All I can find is this ...

  • For its third, the board investigated a separate 2023 attack, in which Chinese state hackers exploited an array of Microsoft security shortcomings to access the email inboxes of top federal officials.

So DHS decided to rely on that info which never looked at SolarWinds ...

  • Silvers told ProPublica that DHS decided the board didn’t need to do its own review of SolarWinds as directed by the White House because the attack had already been “closely studied” by the public and private sectors.
[-] kubica@fedia.io 35 points 4 months ago

Certain companies are untouchable, reminds me of something else going on, but whatever.

[-] danc4498@lemmy.world 15 points 4 months ago

It’s a problem that the wealthy can control both what happens and the narrative surrounding what happened.

[-] homesweethomeMrL@lemmy.world 3 points 4 months ago

A full, public accounting of what happened in the Solar Winds case would have been devastating to Microsoft. ProPublica recently revealed that Microsoft had long known about — but refused to address — a flaw used in the hack. The tech company’s failure to act reflected a corporate culture that prioritized profit over security and left the U.S. government vulnerable, a whistleblower said.

Same shit different decade

[-] conciselyverbose@sh.itjust.works 29 points 4 months ago

What was it, a month later that they shipped a feature that screenshots your PC every 5 seconds to store in an unsecured database?

[-] schizo@forum.uncomfortable.business 17 points 4 months ago

A tech company that prioritizes money over security?

Well that's certainly a new and unexpected twist!

(I don't know if /s is necessary, but just to make sure: /s as fuck)

[-] FarFarAway@startrek.website 16 points 4 months ago* (last edited 4 months ago)

Well it doesnt help that Microsoft got hacked, in January, by the same group that did the Solarwinds hack. It even affected state government. I wonder if someone doing... anything, could have prevented this.

I know the offical story is a weak password, but even the article questions that.

[-] beetlejuice0001@lemmy.zip 1 points 4 months ago

Sounds like a government backdoor was sold out.

[-] culprit@lemmy.ml 7 points 4 months ago

I wonder if this is related to US Feds wanting to keep certain zero-day exploits undisclosed for their own purposes. This is something that has happened a few times already. NSA and the like will maintain silence on exploits they use on targets, or even force implementation of backdoors via quasi-legal means.

There's almost no reason to trust closed-source non-free software anymore really, especially from US-aligned corps.

[-] Brkdncr@lemmy.world 3 points 4 months ago

Maybe I’m not remembering things right, but the solarwinds attack was a supply chain attack. Their upstream code was manipulated internally which resulted in a downstream malicious dll.

I’m not sure how that’s MS’s fault.

[-] Buelldozer@lemmy.today 12 points 4 months ago

Maybe I’m not remembering things right, but the solarwinds attack was a supply chain attack.

You aren't misremembering, that's what we were all told however the reality was a bit different. MS had been ignoring a serious security vulnerability for years. That vuln was eventually used to breech SolarWinds and then that was leverage to breech everyone else.

https://www.propublica.org/article/microsoft-solarwinds-what-you-need-to-know-cybersecurity

[-] LodeMike@lemmy.today 3 points 4 months ago

This thing is so fucking weird to me. Mircosoft argued that it's the companies fault for being hacked because a user account was compromised? Okay wise guy what about corporate espionage via a planted employee?

[-] Album@lemmy.ca 9 points 4 months ago

There were two supply chain attacks, one on solarwinds orion, the other on Microsoft Cloud Services.

Heres the vuln MS knew about in advance that allowed MS Cloud to be comprimised:

https://en.wikipedia.org/wiki/Zerologon

[-] foggy@lemmy.world 5 points 4 months ago

Correct.

And he was caught because his VPN had a lapse in the connection which exposed his actual IP address. It was a disgruntled employee. Not a Russian attack.

Though the Microsoft attack this year, I believe was Russian in origin.

this post was submitted on 08 Jul 2024
229 points (96.4% liked)

News

23296 readers
3320 users here now

Welcome to the News community!

Rules:

1. Be civil


Attack the argument, not the person. No racism/sexism/bigotry. Good faith argumentation only. This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban. Do not respond to rule-breaking content; report it and move on.


2. All posts should contain a source (url) that is as reliable and unbiased as possible and must only contain one link.


Obvious right or left wing sources will be removed at the mods discretion. We have an actively updated blocklist, which you can see here: https://lemmy.world/post/2246130 if you feel like any website is missing, contact the mods. Supporting links can be added in comments or posted seperately but not to the post body.


3. No bots, spam or self-promotion.


Only approved bots, which follow the guidelines for bots set by the instance, are allowed.


4. Post titles should be the same as the article used as source.


Posts which titles don’t match the source won’t be removed, but the autoMod will notify you, and if your title misrepresents the original article, the post will be deleted. If the site changed their headline, the bot might still contact you, just ignore it, we won’t delete your post.


5. Only recent news is allowed.


Posts must be news from the most recent 30 days.


6. All posts must be news articles.


No opinion pieces, Listicles, editorials or celebrity gossip is allowed. All posts will be judged on a case-by-case basis.


7. No duplicate posts.


If a source you used was already posted by someone else, the autoMod will leave a message. Please remove your post if the autoMod is correct. If the post that matches your post is very old, we refer you to rule 5.


8. Misinformation is prohibited.


Misinformation / propaganda is strictly prohibited. Any comment or post containing or linking to misinformation will be removed. If you feel that your post has been removed in error, credible sources must be provided.


9. No link shorteners.


The auto mod will contact you if a link shortener is detected, please delete your post if they are right.


10. Don't copy entire article in your post body


For copyright reasons, you are not allowed to copy an entire article into your post body. This is an instance wide rule, that is strictly enforced in this community.

founded 1 year ago
MODERATORS