Publicado: 18/12/2020

Massive cyberattack grows beyond US, heightening fears

Massive cyberattack grows beyond US, heightening fears

Washington (AFP) -

A devastating cyberattack on US government agencies has also hit targets worldwide with the list of victims still growing, according to researchers, heightening fears over computer security and espionage.

Microsoft said late Thursday that it had notified more than 40 customers hit by the malware which security experts say came from hackers linked to the Russian government and which could allow attackers unfettered network access.

'While roughly 80 percent of these customers are located in the United States, this work so far has also identified victims in seven additional countries,' Microsoft president Brad Smith said in a blog post.

Smith said the victims were also found in Canada, Mexico, Belgium, Spain, Britain, Israel and the United Arab Emirates.

'It?s certain that the number and location of victims will keep growing,' Smith said, echoing concerns voiced this week by US officials on the grave threat from the attack.

'This is not 'espionage as usual,' even in the digital age,' Smith said.

'Instead, it represents an act of recklessness that created a serious technological vulnerability for the United States and the world.'

John Dickson of the security firm Denim Group said many private sector firms which could be vulnerable are scrambling to shore up security, even to the point of considering rebuilding their servers and other equipment.

'Everyone is in damage assessment now because it's so big,' Dickson said.

'It's a severe body blow to confidence both in government and critical infrastructure.'

The threat comes from a long-running attack which is believed to have injected malware into computer networks using enterprise management network software made by the Texas-based IT company SolarWinds, with the hallmarks of a nation-state attack.

- NSA warning -

The National Security Agency, the secretive US military intelligence operation, called for increased vigilance to prevent unauthorized access to key military and civilian systems.

'The recent SolarWinds Orion code compromise is one serious example of how on-premises systems can be compromised, leading to abuse of federated authentication and malicious cloud access,' the NSA said.

Analysts have said the attacks pose threats to national security by infiltrating key government systems, while also creating risks for key infrastructure controls for systems such as electric power grids and other utilities.

The US Cybersecurity and Infrastructure Security Agency (CISA) said US government agencies, critical infrastructure entities, and private sector organizations had been targeted by what it called an 'advanced persistent threat actor.'

CISA did not identify who was behind the malware attack but private security companies pointed a finger at hackers linked to the Russian government.

US Secretary of State Mike Pompeo also suggested involvement by Moscow on Monday, saying the Russian government had made repeated attempts to breach US government networks.

President-elect Joe Biden expressed 'great concern' over the computer breach while Utah Senator Mitt Romney blamed Russia and slammed what he called 'inexcusable silence' from the White House.

Romney likened the cyberattack to a situation in which 'Russian bombers have been repeatedly flying undetected over our entire country.'

Senator Marco Rubio told Fox News: 'It is massive. It is still, I would argue, probably persistent. It is still ongoing... It's a grave risk to federal, to state, to local governments, to critical infrastructure, to the private sector.'

CISA said the computer intrusions began in at least March 2020 and the actor behind them had 'demonstrated patience, operational security and complex tradecraft.'

'This threat poses a grave risk,' CISA said in a statement Thursday, adding that it 'expects that removing this threat actor from compromised environments will be highly complex and challenging for organizations.'

Hackers reportedly installed malware on software used by the US Treasury Department and the Commerce Department, allowing them to view internal email traffic.

Media reports said the Department of Energy, which manages the government's nuclear arsenal, had also been breached.

SolarWinds said up to 18,000 customers, including government agencies and Fortune 500 companies, had downloaded compromised software updates, allowing hackers to spy on email exchanges.

After the attack was detected, CISA ordered federal agencies to power down the breached software.

Más en Zeta

El veinticinco de enero

El veinticinco de enero

15 January 2021
Ese día se conocerán los nombres de los nuevos directores de la Policía Nacional por la jubilación de Jorge Miranda. Se rumora que habrá varios cambios importantes en otros cargos de la entidad. Adiós al IDAAN El director del IDAAN renunció el pasado 14 de enero. Se desconocen la razones, pero ...

Dr Gaitán: Cuidemos la educación del coronavirus.

ZETA PANAMÁ, (EDGARDO GAITÁN*).-UNICEF, se decanta por recomendar la apertura de las escuelas. Dice que los niños no son los supercotagiadores que se decía al inicio de la pandemia y que los adultos son los que contagian a los niños. Tremendas verdades de perogrullo, claro que si no hay escuela...

9 de enero 1964: La Gesta que cambió la historia

ZETA PANAMÁ, (BENJAMÍN COLAMARCO PATIÑO).- El país debe sustentarse en valores, en principios, en objetivos superiores que direccionen la interactuación social y fortalezcan la cohesión estatal-nacional de la República. Quienes nos identificamos con las luchas históricas de nuestro pueblo por pr...

Construir edificios y ciudades saludables no es un lujo para el futuro, es una necesidad para hoy

ZETA, (ARTURO SÁENZ).- Esta es la situación. Desde la década de los ochenta la Organización Mundial de la Salud OMS empezó a reportar la existencia de una estrecha relación entre la aparición de enfermedades crónicas y los lugares de trabajo de las personas. Es decir, se empezaron a documentar m...

Email: This email address is being protected from spambots. You need JavaScript enabled to view it.