US government blames Russia for SolarWinds hack

The accusation comes as SolarWinds faces legal action for failing to disclose vulnerabilities in a timely manner

Last month’s cyber attack on Solarwinds likely originated in Russia, according to a joint statement from four US intelligence agencies, including the FBI, CISA, ODNI, and the NSA.

The four agencies had been appointed by the White House National Security Council to investigate the SolarWinds attack under a joint task force named as the Cyber Unified Coordination Group (UCG).

The attack, which was confirmed in mid-December, saw hackers gain access to the networks of 18,000 SolarWinds public sector and business customers after they successfully compromised the company’s Orion security platform.

Although previously rumoured to have been orchestrated by Russian hackers, the statement marks the US government’s official accusation that the country is responsible for the attack.

The document states that the Advanced Persistent Threat (APT) actor behind the incident is “likely Russian in origin”.

President Donald Trump previously stated that the attack might have been orchestrated by the Chinese state and accused media outlets of being “petrified of discussing the possibility that it may be China”.

In a statement on Twitter last month, the president also downplayed the incident, claiming that “the Cyber Hack is far greater in the Fake News Media than in actuality”. 

“I have been fully briefed and everything is well under control,” he added.

It's also been revealed this week that Solarwinds is facing legal action after one of the company's investors filed a proposed class action filed on Monday. The lawsuit alleges that Solarwinds damaged shareholders by failing to disclose the vulnerabilities in a timely manner.

According to reports from earlier this week, the list of confirmed victims of the hack surpassed 250 US government agencies and businesses. Microsoft has also confirmed that the attackers accessed source code repositories as part of the hack, but didn’t alter the codebase at the heart of the firm’s core products and services.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Nearly seven in ten CISOs expect a ransomware attack
ransomware

Nearly seven in ten CISOs expect a ransomware attack

19 Oct 2021
Acer Taiwan falls victim to cyber attack
hacking

Acer Taiwan falls victim to cyber attack

18 Oct 2021
Marsh McLennan reveals its cyber risk analytics center
risk management

Marsh McLennan reveals its cyber risk analytics center

15 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021