Wednesday, January 13, 2021

SolarWinds Attack and its implication for U.S. Security: Sabotage or espionage?

This article is by

Share this article

Article Contributor(s)

Vaishnavi Krishna Mohan

Article Title

SolarWinds Attack and its implication for U.S. Security: Sabotage or espionage?

Publisher

Global Views 360

Publication Date

January 13, 2021

URL

SolarWinds office in Texas

SolarWinds office in Texas | Source: Glassdoor

SolarWinds, a publicly listed Texas-based company with a value of more than $6 billion, has a very reputed customer list including multiple U.S. government agencies. The company develops softwares for businesses and agencies to help manage and monitor their networks, systems and  IT infrastructure. The company is a service provider to over 425 of the Fortune 500 companies, top 5 U.S. accounting firms, all major U.S. telecom providers, the U.S. treasury, several global universities and educational institutions, the NSA and the White House.

A set of hackers managed to sneak a malicious code into the software update of SolarWinds for a tool called “Orion”. Earlier, in 2020, the hackers had injected malware into the updates of Orion which were released between March and June of 2020. On 5th of Jan, 2021, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure security Agency (CISA), the Office of the director of National Intelligence (ODNI) and the National Security Agency (NSA) made an official joint statement stating, "an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks". U.S. government agencies like The Pentagon, National institute of Health, FBI, DHS, the Department of Energy and the Department of Veterans affairs were some significant users of Orion. In fact, in August 2020, the Department of Veterans affairs renewed its Orion license in a 2.8-million-dollar order. The Department of Veterans affairs has been heavily involved in COVID-19 relief.

The Orion hack began as early as March 2020. Over 18,000 customers had installed the compromised software which implies that these customers were vulnerable to spy operations throughout 2020. The malware inserted in the updates provided remote access of an organization’s network to the elite hackers. Since the malware was undetected for months, it gave the hackers an opportunity to obtain information from their targets. In fact, the hackers could also monitor emails and other internal communications. FireEye, the cybersecurity company who were the first to discover the breach describes the capability of the malware, from initially lying dormant up to two weeks, to hiding in plain sight by masquerading its investigation as “Orion Activity”. In 2016, Russian Military hackers used a method called “supply chain” to infect companies performing business in Ukraine with a hard-drive wiping virus called NotPetya. This attack is considered to be one of the most damaging cyber-attacks till date. The infiltration tactic used in the current hack is also identified to be similar to the “supply chain” method.

The Orion software framework contained a backdoor that communicated via HTTP to third party servers. Cybersecurity firm, FireEye has been tracking the trojanized version of Orion plug-in as SUNBURST.

FireEye Logo

FireEye described the use of SUNBURST backdoor on one of its blogs published on 13th December 2020. It stated,

“After an initial dormant period of up to two weeks, it retrieves and executes commands, called “Jobs”, that include the ability to transfer files, execute files, profile the system, reboot the machine, and disable system services. The malware masquerades its network traffic as the Orion Improvement Program (OIP) protocol and stores reconnaissance results within legitimate plugin configuration files allowing it to blend in with legitimate SolarWinds activity. The backdoor uses multiple obfuscated blocklists to identify forensic and anti-virus tools running as processes, services, and drivers.”

FireEye described the attack through the SUNBURST backdoor as “highly evasive”. Meanwhile, SolarWinds is facing a class action lawsuit filed by a stakeholder of the IT Infrastructure Management software company in the U.S. District Court for the Western District of Texas on 4th Jan 2021. The lawsuit is filed against SolarWinds’ ex-president, Kevin Thompson and chief financial officer, J. Barton Kalsu on the grounds of violating Federal Securities laws under Securities Exchange Act of 1934. The complaint states that SolarWinds Company failed to disclose that "since mid-2020, Orion monitoring products had a vulnerability that allowed hackers to compromise the server upon which the products ran". The complaint also mentioned that SolarWinds update server had a fairly weak and easily accessible password, ‘solarwinds123’.

Microsoft’s internal security research team found evidence that the same hackers had accessed some internal source code in their company’s systems. Microsoft mentioned that the attempted activities were beyond just the presence of malware SolarWinds code in their environment. Microsoft has “an open source like culture” which allows teams within Microsoft to view the source code. The company acknowledges that it is a threat model but they are downplaying the risk by saying “just viewing the source code should not cause any elevated risk”.

The Russian Hackers have also managed to breach the network of Austin City, Texas. The breach dates back to at-least mid of October 2020. The hackers have seemed to target the U.S. Treasury, Departments of Commerce and Homeland Security, The Pentagon, Cybersecurity firm FireEye, and SolarWinds. The breach of the network of the Austin city is an apparent win for Russian hackers. Theoretically, the compromise could have helped them access sensitive information in accordance with the city governance, elections, city police and by excavating deeper, the hackers can practically burrow inside energy, water and airport networks of the city.

Berserk Bear, the hacking outfit that is currently believed to be behind Austin’s breach appears to have used Austin’s network as grounds to stage larger attacks. Berserk Bear also known as BROMINE inter alia several names is believed to have been responsible for a series of breaches of significant U.S. infrastructures in the past year.

The attacks on SolarWinds, U.S. government and FireEye have been linked to another Russian group called APT29 also popularly known as Cozy Bear. Berserk Bear is allegedly a unit of Russian federal Security Service (FSB). Cozy Bear is known to be affiliated with the Russian Foreign Intelligence Service, or SVR. FSB and SVR are considered to be successors of the Committee of State Security of the Soviet-era which was widely known as the KGB.

The Austin Council seems to have been aware of the breach from October 2020. The FBI and CISA had published an initial advisory warning of “advanced persistent threat actors” (APTs) on October 9th, 2020. The advisory warned the city council of APTs targeting state and local governments. On October 22nd, a follow-up advisory was published in which both agencies accredited the breach to Berserk Bear. CISA published a heat map listing the types of organizations that were breached, scanned or targeted by Berserk Bear. The reputation of Berserk Bear of lurking fit their common pattern of espionage-oriented attacks. Sami Ruohonen, a researcher at Finnish cybersecurity firm F-Secure said that the adversaries have already been in the network for more than a couple of months before someone discovers their existence. Ruohonen also mentioned that this technique is specially preferred by APT groups because, the longer they go unnoticed, the longer they have a remote access to the network. F-Secure, in a report published in 2019, compared Berserk Bear and similar groups to the cyber equivalent of sleeper cells.

The cybersecurity experts have warned Austin city and the U.S that Berserk Bear hackers are not just involved in espionage and sabotage. They can gear up at any moment and create havoc in the United States. These Russian Hackers can cause city blackouts, disturbance in water supply and can even disrupt COVID-19 relief. Vikram Thakur, a technical director at Symantec who has tracked Berserk Bear for years quotes,  “We should be cognizant of the level of information that they have, turning on valves or closing valves, things of that sort — they have the expertise to do it.”

Kevin Thomson, the ex-CEO of SolarWinds | Source: SolarWinds Facebook

SolarWinds replaced their ex-CEO Kevin Thomson with Mr Sudhakar Ramakrishnan. Unlike his predecessor Thomson, who is an accountant by training, Ramakrishnan comes from a security background having led Pulse Secure in the recent past. The new CEO publicly stated that the company will be making 5 critical changes to put security front and center. The company also hired ex-CISA chief Chris Krebs and Facebook’s former security lead, Alex Stamos. Krebs and Stamos work as independent consultants to help the company coordinate its crisis response. Krebs told the Financial Times that it could even take years to uncover the full extent of the hack. On the brighter side, the new CEO mentioned that the company has engaged several cybersecurity experts to assist SolarWinds in its efforts to become more secure.  We can hope that, with better expertise, vision and understanding of threat and vulnerability management, the company is now headed towards a better future.

Support us to bring the world closer

To keep our content accessible we don't charge anything from our readers and rely on donations to continue working. Your support is critical in keeping Global Views 360 independent and helps us to present a well-rounded world view on different international issues for you. Every contribution, however big or small, is valuable for us to keep on delivering in future as well.

Support Us

Share this article

Read More

February 4, 2021 5:18 PM

Internet privacy in Brazil: An example of already weakened state of Democracy

Brazil’s president Jair Bolsonaro’s ascent to power attracted international attention for their potential impact on human rights. His highly controversial positions on Brazil’s past military dictatorship, civil rights and his greater support for conservative agenda is very likely to jeopardize freedom of expression and the nation’s fragile democracy. Bolsonaro’s ascent to power has not been welcomed by people around the globe.  His blind eye towards democracy has created a human rights crisis in Brazil. In 2017, violence reached a new record in the books of Brazil with an estimated 64,000 killings. More than 1.2 million cases of domestic violence were pending in the courts at the start of 2018. About 5,144 people were killed due to police brutality in 2017 and weakening state control of prisons has facilitated gang recruitments. Brazil has lost over 100,000 people to COVID-19, the pandemic which Bolsonaro strongly repudiated as a conspiracy. The president’s desperate authoritarian attempts to forcibly seize control has pushed the nation into a political crisis inter alia free fall of the economy, a pandemic, a human rights crisis and a democratic recession. “This is the worst crisis Brazil has faced in its history. It’s a political crisis, an economic crisis, and a public health crisis. I’ve thought about this a lot, and I can’t think of another moment when the country was in worse shape than it is right now.” These are the exact words of Professor James Green, a Brazilian studies teacher at Brown University, a man who has lived through the military dictatorship in Brazil which lasted from 1964 to 1985.

Amidst these crises, Bolsonaro has periled the integrity and autonomy of Brazil’s most vital democratic institutions. In May 2020, the scandalous president even contemplated ramping up the military to shut down Brazil’s Supreme Court as they continued investigations into his network of advisors and his family. The anti-terrorism bills pushed in the senate after the ascent of Bolsonaro is another key example of endangerment to democracy. The vague and broad definitions of terrorism in the bill potentially criminalizes protests and even basic social movements. These are inconsistent with the standard of precision that Brazilian criminal law maintains. The capricious characterization of a “terrorist act” leaves the door open to subjective and arbitrary decisions which is not new to the nation.

The anti-terrorism bill says that it is “terrorist act” to interfere or tamper computer systems or databases with any political or ideological motivation even without a malicious intent. This would jeopardize the work of several security researchers and journalists in Brazil. Unfortunately, they are not alone.

On 30th June 2020, the Senate of brazil passed the PLS 2630/2020   (Law of Freedom, Liability, and Transparency on the Internet) popularly known as the fake-news law. Fake news has definitely been a problem all over the world. 17 states have passed some form of regulation directing disinformation during the pandemic. The term “fake-news” has been engraved in the global political discourse in the last half decade. With the decline in global levels of press freedom, the domino effect of so-called “fake-news laws” is attracting some serious risks to press freedom and freedom of expression. It is certain that Bolsonaro took advantage of the pandemic situation and passed the fake-news law with the excuse of COVID-19 misinformation. There are several underlying concerns and apprehensions about this law.

  1. Traceability requirements for private messaging services like WhatsApp and Signal would require the apps to store the logs and records of “broadcasted messages” which implies all the messages sent by over 5 users which reaches at least 1000 people within the span of three months. Messaging service companies are required to report most of the information to the government of Brazil hence creating a centralized log of data interactions. This breaks the end-to-end encryption service provided to the users by some of the messaging apps. If companies do not oblige to weaken the technical protection given to the users of Brazil, the bill forces them to leave the country.
    This imposition of “tech mandate” was condemned by Electronic Frontier Foundation (EFF) as they called it out for weakening privacy protection. Attached to this is a “technical capability derivative”, whether or not platforms will be able to trace back individual messages.
  1. Article 37 of the law mandates all the private messaging and social networking apps having a customer base in Brazil to appoint a legal representative who will have the power to remotely access user logs and databases. This pseudo attempt to localize the measures not just gives rise to privacy concerns but also questions if the Brazilian Senate has undermined United States’ laws such as Electronic Communication Privacy Act and CLOUD Act. Both of these laws mandate US-based social networking service providers to follow and check certain legal safeguard before handing the private data to any foreign law enforcement agents.
  1. If any social media account is reported to be inauthentic or automated, the online platform would have to confirm the identity of the user and verify the identity with any government ID in Brazil or a passport for a foreigner. The government can also demand confirmation of identity for any account through the means of a court order. This provision broadly attacks anonymity and privacy of users online and ignores its benefits on the internet such as whistle blowing and protection from stalkers.
  1. This law also makes it illegal to create or share any content online which may pose a risk to” economic order or social peace” in Brazil. Both of these terms are vaguely defined and even vaguely present. This opens gates to a wide range of content creators to be called out as “illegal”. The law also criminalizes intentionally being a member of an online group whose main activity is sharing defamatory content. This includes all meme groups which primarily share memes about anyone in an authoritative position in Brazil. This definitely puts a subjective cap and poses significant challenges to the freedom of expression and restricts basic ability of Brazilians to engage in discourse on online platforms.

The fake-news law makes social media companies legally liable for content published online on their platforms which acts as an incentive to them to restrict the freedom of speech of Brazilians at the time of any social or political unrest or even times like the present. While Brazil faces a real problem of fake news, this hastily written statute is not the right solution. At the time of a pandemic, when most of the world is functioning on a virtual sphere, the reckless fake-news law has added weight onto the fragile thread holding Brazil’s democracy. Jair Bolsonaro has managed to push democracy to a breaking point even without the drastic steps that he earlier contemplated.

Read More