{"id":23558,"date":"2021-01-02T11:12:46","date_gmt":"2021-01-02T11:12:46","guid":{"rendered":"https:\/\/www.lifeandnews.com\/articles\/?p=23558"},"modified":"2021-01-03T13:16:03","modified_gmt":"2021-01-03T13:16:03","slug":"the-sunburst-hack-was-massive-and-devastating-5-observations-from-a-cybersecurity-expert","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/the-sunburst-hack-was-massive-and-devastating-5-observations-from-a-cybersecurity-expert\/","title":{"rendered":"The Sunburst hack was massive and devastating \u2013 5 observations from a cybersecurity expert"},"content":{"rendered":"<p><a href=\"https:\/\/theconversation.com\/profiles\/paulo-shakarian-1189989\">Paulo Shakarian<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/arizona-state-university-730\">Arizona State University<\/a><\/em><\/p>\n<p>So much remains unknown about what is now being called the Sunburst hack, the cyberattack against U.S. government agencies and corporations. U.S. officials <a href=\"https:\/\/www.washingtonpost.com\/national-security\/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm\/2020\/12\/13\/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html\">widely believe<\/a> that Russian state-sponsored hackers are responsible.<\/p>\n<p>The attack gave the perpetrators access to numerous key American business and government organizations. The immediate effects will be difficult to judge, and a complete accounting of the damage is unlikely. However, the nature of the affected organizations alone makes it clear that this is perhaps the most consequential cyberattack against the U.S. to date.<\/p>\n<p>An act of cyberwar is usually not like a bomb, which causes immediate, well-understood damage. Rather, it is more like a cancer \u2013 it\u2019s slow to detect, difficult to eradicate, and it causes ongoing and significant damage over a long period of time. Here are five points that cybersecurity experts \u2013 the oncologists in the cancer analogy \u2013 can make with what\u2019s known so far.<\/p>\n<h2>1. The victims were tough nuts to crack<\/h2>\n<p>From top-tier cybersecurity firm FireEye to the U.S. Treasury, Microsoft, Intel and many other organizations, the victims of the attack are for the most part firms with comprehensive cybersecurity practices. The list of <a href=\"https:\/\/www.businessinsider.com\/list-of-companies-agencies-at-risk-after-solarwinds-hack-2020-12?op=1\">organizations that use the compromised software<\/a> includes firms like MasterCard, Lockheed Martin and PricewaterhouseCoopers. SolarWinds estimates about <a href=\"https:\/\/www.zdnet.com\/article\/sec-filings-solarwinds-says-18000-customers-are-impacted-by-recent-hack\/\">18,000 firms<\/a> were affected.<\/p>\n<p>As CEO of cybersecurity firm Cyber Reconnaissance Inc. and an <a href=\"https:\/\/scholar.google.com\/citations?user=OUAMn6oAAAAJ&amp;hl=en\">associate professor of computer science<\/a> at Arizona State University, I have met security professionals from many of the targeted organizations. Many of the organizations have world-class cybersecurity teams. These are some of the hardest targets to hit in corporate America. The victims of Sunburst were specifically targeted, likely with a primary focus on intelligence gathering.<\/p>\n<h2>2. This was almost certainly the work of a nation \u2013 not criminals<\/h2>\n<p>Criminal hackers focus on near-term financial gain. They use techniques like ransomware to extort money from their victims, steal financial information, and harvest computing resources for activities like sending spam emails or mining for cryptocurrency.<\/p>\n<p>Criminal hackers exploit well-known security vulnerabilities that, had the victims been more thorough in their security, could have been prevented. The hackers typically target organizations with weaker security, like health care systems, universities and municipal governments. University networks are notoriously decentralized, difficult to secure, and often underfund cybersecurity. Medical systems tend to use specialty medical devices that run older, vulnerable software that is difficult to upgrade.<\/p>\n<p>Hackers associated with national governments, on the other hand, have entirely different motives. They look for long-term access to critical infrastructure, gather intelligence and develop the means to disable certain industries. They also steal intellectual property \u2013 especially intellectual property that is expensive to develop in fields like high technology, medicine, defense and agriculture.<\/p>\n<figure class=\"align-center zoomable\"><a href=\"https:\/\/images.theconversation.com\/files\/376596\/original\/file-20201223-49872-i98bca.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/376596\/original\/file-20201223-49872-i98bca.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/376596\/original\/file-20201223-49872-i98bca.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=400&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/376596\/original\/file-20201223-49872-i98bca.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=400&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/376596\/original\/file-20201223-49872-i98bca.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=400&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/376596\/original\/file-20201223-49872-i98bca.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/376596\/original\/file-20201223-49872-i98bca.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/376596\/original\/file-20201223-49872-i98bca.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=3 2262w\" alt=\"A smart phone displaying the FireEye logo\" \/><\/a><figcaption><span class=\"caption\">One of the targeted organizations, cybersecurity firm FireEye, would be a poor choice for cybercriminals but highly desirable for the Russian government or other adversaries of the U.S.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.gettyimages.com\/detail\/news-photo\/in-this-photo-illustration-a-fireeye-cyber-security-company-news-photo\/1230182459?adppopup=true\">SOPA Images\/LightRocket via Getty Images<\/a><\/span><\/figcaption><\/figure>\n<p>The sheer amount of effort to infiltrate one of the Sunburst victim firms is also a telling sign that this was not a mere criminal hack. For example, a firm like FireEye is an inherently bad target for a criminal attacker. It has fewer than 4,000 employees yet has computer security on par with the world\u2019s top defense and financial businesses.<\/p>\n<h2>3. The attack exploited trusted third-party software<\/h2>\n<p>The hackers gained access by slipping their malware into software updates of SolarWinds\u2019 Orion software, which is widely used to manage large organizational networks. The Sunburst attack relied on a trusted relationship between the targeted organization and SolarWinds. When users of Orion updated their systems in the spring of 2020, they unwittingly invited a Trojan horse into their computer networks.<\/p>\n<p>Aside from <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2020-12-21\/solarwinds-adviser-warned-of-lax-security-years-before-hack\">a report about lax security<\/a> at SolarWinds, very little is known about how the hackers gained initial access to SolarWinds. However, the Russians have used the tactic of compromising a third-party software update process before, in 2017. This was during the infamous <a href=\"https:\/\/medium.com\/@PauloShak\/learning-from-notpetya-43f2fea8994c\">NotPetya<\/a> attack, which was considered the most financially <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\">damaging cyberattack in history<\/a>.<\/p>\n<h2>4. The extent of the damage is unknown<\/h2>\n<p>It will take time to uncover the extent of the damage. The investigation is complicated because the attackers gained access to most of the victims in the spring of 2020, which gave the hackers time to expand and hide their access and control of the victims\u2019 systems. For example, <a href=\"https:\/\/krebsonsecurity.com\/2020\/12\/vmware-flaw-a-vector-in-solarwinds-breach\/\">some experts believe<\/a> that a vulnerability in VMWare, software that is widely used in corporate networks, was also used to gain access to the victims\u2019 systems, <a href=\"https:\/\/www.sdxcentral.com\/articles\/news\/vmware-denies-its-software-used-in-solarwinds-hack\/2020\/12\/\">though the company denies it<\/a>.<\/p>\n<figure class=\"align-center zoomable\"><a href=\"https:\/\/images.theconversation.com\/files\/376594\/original\/file-20201223-23-161id6c.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/376594\/original\/file-20201223-23-161id6c.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/376594\/original\/file-20201223-23-161id6c.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=338&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/376594\/original\/file-20201223-23-161id6c.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=338&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/376594\/original\/file-20201223-23-161id6c.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=338&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/376594\/original\/file-20201223-23-161id6c.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/376594\/original\/file-20201223-23-161id6c.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/376594\/original\/file-20201223-23-161id6c.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=424&amp;fit=crop&amp;dpr=3 2262w\" alt=\"the Microsoft logo on the side of a building\" \/><\/a><figcaption><span class=\"caption\">Some of the exposed organizations, like Microsoft, made limited use of the SolarWinds software, which appears to have contained the damage they suffered.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/images.app.goo.gl\/at74GEFtP7Qac6ps7\">Raimond Spekking<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA<\/a><\/span><\/figcaption><\/figure>\n<p>I expect the damage to be spread unevenly among the victims. This will depend on various factors such as how extensively the organization used the SolarWinds software, how segmented its networks are, and the nature of their software maintenance cycle. For example, Microsoft <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2020-12-18\/microsoft-says-its-systems-were-exposed-in-solarwinds-hack\">reportedly had limited deployments of Orion<\/a>, so the attack had limited impact on their systems.<\/p>\n<p>In contrast, the bounty the hackers stole from FireEye included <a href=\"https:\/\/blog.cyr3con.ai\/the-vulnerabilities-fireeye-hackers-will-start-to-use\">penetration testing tools<\/a>, which were used to test the defenses of high-end FireEye clients. The theft of these tools was likely prized by hackers to both increase their capabilities in future attacks as well as gain insights into what FireEye clients are protecting against.<\/p>\n<h2>5. The fallout could include real-world harm<\/h2>\n<p>There is a very thin, often nonexistent line between gathering information and causing real-world harm. What may start as spying or espionage can easily escalate into warfare.<\/p>\n<p>The presence of malware on a computer system that gives the attacker greater user privileges is dangerous. Hackers can use control of a computer system to destroy computer systems, as was the case in the <a href=\"https:\/\/phys.org\/news\/2012-10-iran-cyberattack-saudi-ex-official.html\">Iranian cyberattacks against Saudi Aramco in 2012<\/a>, and harm physical infrastructure, as was the case <a href=\"https:\/\/www.wired.com\/2014\/11\/countdown-to-zero-day-stuxnet\/\">Stuxnet attack against Iranian nuclear facilities in 2010<\/a>.<\/p>\n<p>Further, real harm can be done to individuals with information alone. For example, the <a href=\"https:\/\/www.technologyreview.com\/2020\/02\/10\/349004\/the-us-says-the-chinese-military-hacked-equifax-heres-how\/\">Chinese breach of Equifax<\/a> in 2017 has put detailed financial and personal information about millions of Americans in the hands of one of the U.S.\u2019s greatest strategic competitors.<\/p>\n<p>No one knows the full extent of the Sunburst attack, but the scope is large and the victims represent important pillars of the U.S. government, economy and critical infrastructure. Information stolen from those systems and malware the hackers have likely left on them can be used for follow-on attacks. I believe it is likely that the Sunburst attack will result in harm to Americans.<\/p>\n<p>[<em>Get the best of The Conversation, every weekend.<\/em> <a href=\"https:\/\/theconversation.com\/us\/newsletters\/weekly-highlights-61?utm_source=TCUS&amp;utm_medium=inline-link&amp;utm_campaign=newsletter-text&amp;utm_content=weeklybest\">Sign up for our weekly newsletter<\/a>.]<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading=\"lazy\" style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;\" src=\"https:\/\/counter.theconversation.com\/content\/152444\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><a href=\"https:\/\/theconversation.com\/profiles\/paulo-shakarian-1189989\">Paulo Shakarian<\/a>, Associate Professor of Computer Science, <em><a href=\"https:\/\/theconversation.com\/institutions\/arizona-state-university-730\">Arizona State University<\/a><\/em><\/p>\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/the-sunburst-hack-was-massive-and-devastating-5-observations-from-a-cybersecurity-expert-152444\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Paulo Shakarian, Arizona State University So much remains unknown about what is now being called the Sunburst hack, the cyberattack against U.S. government agencies and corporations. U.S. officials widely believe that Russian state-sponsored hackers are responsible. The attack gave the perpetrators access to numerous key American business and government organizations. The immediate effects will be [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":23559,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[9237,798,612,793,234,9236],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/23558"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=23558"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/23558\/revisions"}],"predecessor-version":[{"id":23565,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/23558\/revisions\/23565"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/23559"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=23558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=23558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=23558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}