US govt taskforce to tackle SolarWinds Orion hack


By Dylan Bushell-Embling
Monday, 11 January, 2021


US govt taskforce to tackle SolarWinds Orion hack

The US National Security Council has convened a taskforce to investigate a cyber attack by an alleged Russian state-sponsored attacker affecting government customers of SolarWinds’ Orion IT infrastructure monitoring and management platform.

Preliminary intelligence indicates that the culprit is an advanced persistent threat actor likely of Russian origin, according to the Cybersecurity & Infrastructure Security Agency (CISA).

The attacker is believed to be responsible for most or all of the breaches into both government and non-government networks running SolarWinds Orion.

The taskforce, known as the Cyber Unified Coordination Group (UCG), will coordinate the investigation of the cyber attack. It will consist of members from the FBI, CISA and the Office of the Director of National Intelligence (ODNI), with support from the National Security Agency.

According to the taskforce, around 18,000 public and private sector customers of the platform are believed to have been affected by the compromise, but only a small subset are thought to have been compromised by follow-on activity on their systems.

The FBI’s investigation will focus on identifying victims, collecting and analysing evidence and sharing results with government and private sector partners.

CISA will focus on sharing information about the investigation, and has created a free tool for detecting unusual and potentially malicious activity related to the attack. ODNI will provide situational awareness for key stakeholders and coordinate intelligence collection activities to address knowledge gaps.

“This is a serious compromise that will require a sustained and dedicated effort to remediate. Since its initial discovery, the UCG, including hardworking professionals across the United States Government, as well as our private sector partners have been working non-stop. These efforts did not let up through the holidays,” CISA said in a statement.

“The UCG remains focused on ensuring that victims are identified and able to remediate their systems, and that evidence is preserved and collected. Additional information, including indicators of compromise, will be made public as they become available.”

Image credit: ©stock.adobe.com/au/James Thew

Related Articles

Secure-by-design software development for digital innovation

The rise of DevSecOps methodologies and developments in AI offers every business the opportunity...

Bolstering AI-powered cybersecurity in the face of increasing threats

The escalation of complex cyber risks is becoming a pressing issue for those in business...

How attackers are weaponising GenAI through data poisoning and manipulation

The possibility for shared large language models to be manipulated through data poisoning...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd