Wednesday, January 13, 2021

SolarWinds Attack and its implication for U.S. Security: Sabotage or espionage?

This article is by

Share this article

Article Contributor(s)

Vaishnavi Krishna Mohan

Article Title

SolarWinds Attack and its implication for U.S. Security: Sabotage or espionage?

Publisher

Global Views 360

Publication Date

January 13, 2021

URL

SolarWinds office in Texas

SolarWinds office in Texas | Source: Glassdoor

SolarWinds, a publicly listed Texas-based company with a value of more than $6 billion, has a very reputed customer list including multiple U.S. government agencies. The company develops softwares for businesses and agencies to help manage and monitor their networks, systems and  IT infrastructure. The company is a service provider to over 425 of the Fortune 500 companies, top 5 U.S. accounting firms, all major U.S. telecom providers, the U.S. treasury, several global universities and educational institutions, the NSA and the White House.

A set of hackers managed to sneak a malicious code into the software update of SolarWinds for a tool called “Orion”. Earlier, in 2020, the hackers had injected malware into the updates of Orion which were released between March and June of 2020. On 5th of Jan, 2021, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure security Agency (CISA), the Office of the director of National Intelligence (ODNI) and the National Security Agency (NSA) made an official joint statement stating, "an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks". U.S. government agencies like The Pentagon, National institute of Health, FBI, DHS, the Department of Energy and the Department of Veterans affairs were some significant users of Orion. In fact, in August 2020, the Department of Veterans affairs renewed its Orion license in a 2.8-million-dollar order. The Department of Veterans affairs has been heavily involved in COVID-19 relief.

The Orion hack began as early as March 2020. Over 18,000 customers had installed the compromised software which implies that these customers were vulnerable to spy operations throughout 2020. The malware inserted in the updates provided remote access of an organization’s network to the elite hackers. Since the malware was undetected for months, it gave the hackers an opportunity to obtain information from their targets. In fact, the hackers could also monitor emails and other internal communications. FireEye, the cybersecurity company who were the first to discover the breach describes the capability of the malware, from initially lying dormant up to two weeks, to hiding in plain sight by masquerading its investigation as “Orion Activity”. In 2016, Russian Military hackers used a method called “supply chain” to infect companies performing business in Ukraine with a hard-drive wiping virus called NotPetya. This attack is considered to be one of the most damaging cyber-attacks till date. The infiltration tactic used in the current hack is also identified to be similar to the “supply chain” method.

The Orion software framework contained a backdoor that communicated via HTTP to third party servers. Cybersecurity firm, FireEye has been tracking the trojanized version of Orion plug-in as SUNBURST.

FireEye Logo

FireEye described the use of SUNBURST backdoor on one of its blogs published on 13th December 2020. It stated,

“After an initial dormant period of up to two weeks, it retrieves and executes commands, called “Jobs”, that include the ability to transfer files, execute files, profile the system, reboot the machine, and disable system services. The malware masquerades its network traffic as the Orion Improvement Program (OIP) protocol and stores reconnaissance results within legitimate plugin configuration files allowing it to blend in with legitimate SolarWinds activity. The backdoor uses multiple obfuscated blocklists to identify forensic and anti-virus tools running as processes, services, and drivers.”

FireEye described the attack through the SUNBURST backdoor as “highly evasive”. Meanwhile, SolarWinds is facing a class action lawsuit filed by a stakeholder of the IT Infrastructure Management software company in the U.S. District Court for the Western District of Texas on 4th Jan 2021. The lawsuit is filed against SolarWinds’ ex-president, Kevin Thompson and chief financial officer, J. Barton Kalsu on the grounds of violating Federal Securities laws under Securities Exchange Act of 1934. The complaint states that SolarWinds Company failed to disclose that "since mid-2020, Orion monitoring products had a vulnerability that allowed hackers to compromise the server upon which the products ran". The complaint also mentioned that SolarWinds update server had a fairly weak and easily accessible password, ‘solarwinds123’.

Microsoft’s internal security research team found evidence that the same hackers had accessed some internal source code in their company’s systems. Microsoft mentioned that the attempted activities were beyond just the presence of malware SolarWinds code in their environment. Microsoft has “an open source like culture” which allows teams within Microsoft to view the source code. The company acknowledges that it is a threat model but they are downplaying the risk by saying “just viewing the source code should not cause any elevated risk”.

The Russian Hackers have also managed to breach the network of Austin City, Texas. The breach dates back to at-least mid of October 2020. The hackers have seemed to target the U.S. Treasury, Departments of Commerce and Homeland Security, The Pentagon, Cybersecurity firm FireEye, and SolarWinds. The breach of the network of the Austin city is an apparent win for Russian hackers. Theoretically, the compromise could have helped them access sensitive information in accordance with the city governance, elections, city police and by excavating deeper, the hackers can practically burrow inside energy, water and airport networks of the city.

Berserk Bear, the hacking outfit that is currently believed to be behind Austin’s breach appears to have used Austin’s network as grounds to stage larger attacks. Berserk Bear also known as BROMINE inter alia several names is believed to have been responsible for a series of breaches of significant U.S. infrastructures in the past year.

The attacks on SolarWinds, U.S. government and FireEye have been linked to another Russian group called APT29 also popularly known as Cozy Bear. Berserk Bear is allegedly a unit of Russian federal Security Service (FSB). Cozy Bear is known to be affiliated with the Russian Foreign Intelligence Service, or SVR. FSB and SVR are considered to be successors of the Committee of State Security of the Soviet-era which was widely known as the KGB.

The Austin Council seems to have been aware of the breach from October 2020. The FBI and CISA had published an initial advisory warning of “advanced persistent threat actors” (APTs) on October 9th, 2020. The advisory warned the city council of APTs targeting state and local governments. On October 22nd, a follow-up advisory was published in which both agencies accredited the breach to Berserk Bear. CISA published a heat map listing the types of organizations that were breached, scanned or targeted by Berserk Bear. The reputation of Berserk Bear of lurking fit their common pattern of espionage-oriented attacks. Sami Ruohonen, a researcher at Finnish cybersecurity firm F-Secure said that the adversaries have already been in the network for more than a couple of months before someone discovers their existence. Ruohonen also mentioned that this technique is specially preferred by APT groups because, the longer they go unnoticed, the longer they have a remote access to the network. F-Secure, in a report published in 2019, compared Berserk Bear and similar groups to the cyber equivalent of sleeper cells.

The cybersecurity experts have warned Austin city and the U.S that Berserk Bear hackers are not just involved in espionage and sabotage. They can gear up at any moment and create havoc in the United States. These Russian Hackers can cause city blackouts, disturbance in water supply and can even disrupt COVID-19 relief. Vikram Thakur, a technical director at Symantec who has tracked Berserk Bear for years quotes,  “We should be cognizant of the level of information that they have, turning on valves or closing valves, things of that sort — they have the expertise to do it.”

Kevin Thomson, the ex-CEO of SolarWinds | Source: SolarWinds Facebook

SolarWinds replaced their ex-CEO Kevin Thomson with Mr Sudhakar Ramakrishnan. Unlike his predecessor Thomson, who is an accountant by training, Ramakrishnan comes from a security background having led Pulse Secure in the recent past. The new CEO publicly stated that the company will be making 5 critical changes to put security front and center. The company also hired ex-CISA chief Chris Krebs and Facebook’s former security lead, Alex Stamos. Krebs and Stamos work as independent consultants to help the company coordinate its crisis response. Krebs told the Financial Times that it could even take years to uncover the full extent of the hack. On the brighter side, the new CEO mentioned that the company has engaged several cybersecurity experts to assist SolarWinds in its efforts to become more secure.  We can hope that, with better expertise, vision and understanding of threat and vulnerability management, the company is now headed towards a better future.

Support us to bring the world closer

To keep our content accessible we don't charge anything from our readers and rely on donations to continue working. Your support is critical in keeping Global Views 360 independent and helps us to present a well-rounded world view on different international issues for you. Every contribution, however big or small, is valuable for us to keep on delivering in future as well.

Support Us

Share this article

Read More

March 7, 2021 10:10 AM

Bengal Elections: Will there be a transfer of power or TMC’s will rule continue?

As the assembly elections in West Bengal are getting closer, the competition between the Bharatiya Janata Party (BJP) and Trinamool Congress (TMC) is getting more intense. This election and its result will  be historic. Whole nation is looking forward to the Bengal Elections keenly.

Recently, there was a lot of hue and cry by the BJP when some people allegedly tried to attack the BJP party president JP Nadda's convoy near Diamond harbour in West Bengal. While the BJP labelled the attack as a “sponsored violence”, CM Mamata Banerjee called it a “drama” staged by the BJP to gain media attention. But apart from all this, there are other things which make this election important.

Other than the BJP and the ruling TMC, there are other players as well – Left Front, led by CPI(M), Congress Party, AIMIM.

The situation of the Left Front and the Congress

Rally of Congress and Left Alliance | Source: IBTimes

In the 2019 Lok Sabha elections, the Left Front did not win a single parliamentary seat. Also, except the Jadavpur constituency, it lost all its deposits in all the seats. The Indian National Congress, which is its alliance partner, did not fare well as well and managed to get two seats only. In the upcoming 2021 assembly elections, the two parties have again joined hands, and this time, it’s not just about the electoral victory, but also about maintaining their relevance in the state.

The Left Front, which used to be a major party in the state and ruled for decades, is now seeing an existential crisis. Their first aim is to retain themselves as the main opposition party of West Bengal. Mamata Banerjee’s thumping victory in the 2011 elections marked the end of the Left rule in West Bengal. In the 2016 Assembly Elections, Trinamool Congress had a landslide victory, whereas the BJP got only two seats. But now, the BJP is emerging as the main opposition to TMC, which should be a matter of concern for the Left Front which is losing ground. In an article by The Quint, CPI(M) leader Shatarup Ghosh said, “Of course the BJP is our main opposition—not just in West Bengal but also nationally. They are ideologically and politically completely opposed to us. But that being said, we are not ready to give an inch to Mamata Banerjee either. The TMC needs to go, but they can’t be replaced by the BJP. That is our position”. The Left also alleges that TMC violence against them increased especially after 2016. “At this point, because we couldn’t function in full strength, there was a void in the space of the opposition. The BJP came in at that point and said that they’re running the centre, have CBI, ED and other machinery and can help fight the TMC in a way that the Left can’t. Those who wanted to vote against TMC, therefore, naturally went to them”, he adds.

The Indian National Congress has ruled West Bengal first from 1947–62, and then again from 1972–77. After that, Congress has not performed well in the elections here.

Rise of AIMIM in West Bengal

Asaduddin Owaisi, the face of AIMIM | Source: Wikimedia

All India Majlis-e-Ittehad Ul Muslimeen– better known as AIMIM, has seen a rise recently outside their home state, after winning 5 seats in the Bihar elections. Party President Asaduddin Owaisi held a meeting with AIMIM West Bengal party functionaries for taking their views with regards to the upcoming elections and political situation in the state, calling it a “fruitful” meeting.

On AIMIM focusing on Bengal Elections, TMC MP Saugata Roy took a jibe at the party’s chief and called him “an assistant of the BJP, who is being used by the latter to split non-BJP votes”.

A Muslim voter in Bengal | Source: Wikimedia

Muslim votes are crucial for the TMC. AIMIM senior leader Syed Asim Waqar tweeted, telling Mamata Banerjee’s party that their enemy is the same, the BJP. Aurangabad MP and AIMIM Maharashtra President Imtiaz Jaleel tweeted: "Bihar tou jhaaki hai...WB, UP baaki hai" (Bihar is just the beginning, West Bengal and Uttar Pradesh are remaining). Other than this, party chief Owaisi recently said that it has been the consistent stand of the party that it would not contest elections in Assam and Kerala, as AIUDF and the Indian Union Muslim League are present in the two states. These points clearly show which states the party is aiming for.

AIMIM rallies had also gathered large crowds in Bihar. It won 5 seats in the Seemanchal region of Bihar, which borders West Bengal. It is also trying to emerge as the voice of the Muslims in states like West Bengal and UP. AIMIM was part of the Grand Secular Democratic Front, that had two UP based parties—Bahujan Samaj Party(BSP) and the Suheldev Bhartiya Samaj Party (SBSP)—besides Samajwadi Janta Dal and Rashtriya Lok Samta Party (RLSP). Owaisi's party was the best performer among all of them, other than that only BSP managed to get one seat.

Muslims in West Bengal

Muslims form about 27% of the West Bengal state population, but still remain underrepresented. They account for only 6% of government jobs. Although their representation has been better under the TMC, they still need improvement in the representation for the betterment of their community.

BJP and TMC

CM Mamata Banerjee (L) and PM Narendra Modi (R) meeting | Source: Wikimedia

Recently, TMC MLA Suvendu Adhikari—along with 23 others—joined BJP, at Home Minister Amit Shah's Midnapore rally, as a major blow to Mamata Banerjee and the TMC. Shah alleged that Mamata Banerjee has changed her party’s slogan from “Maa, Maati, Manush” (Mother, Earth, Humanity) to “extortion, corruption and pandering to the nephew”, targeting Banerjee’s nephew and MP Abhishek Banerjee.

The BJP increased its seats from 2 to 18 in West Bengal in the 2019, which came as a surprise. Almost 57% of Hindu votes went to the BJP, and 32% to TMC. The party is trying to woo Hindus and also the Hindi-speaking population of West Bengal. Recently, BJP-supported Hindutva organisations such as the VHP, Bajrang Dal and the RSS, which had only a little presence in the state, have become more assertive, as was seen through their armed processions for Ram Navami.

Suvendu Adhikari, TMC leader who recently joined BJP | Source: মঞ্জুর আলম খান via Wikimedia

To keep a check on the saffron party’s rise, the Mamata government made sure to announce new schemes and that the previously implemented policies remain fresh in the minds of the people. Recently, the TMC released its 'report card' on the work they have done and the promises kept. They have mentioned the 'Sabujsathi' scheme in it, which, according to the Mamata government, has been fulfilled. In this scheme, bicycles were to be distributed among approximately 40 lakh students from classes 9th to 12th studying in govt run and govt aided schools in West Bengal. The scheme was launched in September 2015. A scheme called “Swasth Saathi” was launched recently by the West Bengal government, as the BJP attacked the government by saying it did not implement the Ayushman Bharat scheme of the central government.

Even after opposition from newly emerging parties in the state, like the BJP and AIMIM, other than that from the already existing parties, the Left Front and the Congress, the TMC is trying to remain optimistic about their third term. Who’s winning? Only time—and the people of West Bengal—will tell.

Read More