TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

U.S. Treasury, Commerce Depts. Hacked Through SolarWinds Compromise

632 pointsby pictureover 4 years ago

39 comments

thesimonover 4 years ago
SolarWinds hasn&#x27;t bothered to revoke their certs or remove the package<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;KyleHanslovan&#x2F;status&#x2F;1338360093767823362" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;KyleHanslovan&#x2F;status&#x2F;1338360093767823362</a><p>Back in 2019 apparently their FTP server credentials were exposed on GitHub, allowing automated updates being pushed<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;vinodsparrow&#x2F;status&#x2F;1338431183588188160&#x2F;photo&#x2F;1" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;vinodsparrow&#x2F;status&#x2F;1338431183588188160&#x2F;...</a><p>Edit: If updates failed due to signature not matching, SolarWinds recommended downloading the package and installing it manually, LOL<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;KyleHanslovan&#x2F;status&#x2F;1338419999665508354&#x2F;photo&#x2F;1" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;KyleHanslovan&#x2F;status&#x2F;1338419999665508354...</a>
评论 #25421579 未加载
评论 #25421812 未加载
评论 #25423965 未加载
评论 #25422760 未加载
评论 #25421205 未加载
评论 #25424017 未加载
评论 #25425485 未加载
random5634over 4 years ago
A couple of quick notes:<p>1) The OPM hack and now this all illustrate - if govt gives itself the big backdoors into everything, it&#x27;s likely they will give it to russia, criminals, ex-boyfriends stalking ex-girlfriends etc.<p>2) My own impression of govt IT is largely security theatre in the area I was involved. In particular such massive complexity that agency staff think going around the rules is normal, because it&#x27;s the only way to actually get work done. And then such glaring weaknesses that no one cares to fix. With google I&#x27;ve had one password for 20 years (my google account) which allows a hardware key for 2FA or google authenticator with what I imagine is sensible monitoring, new device authentication etc (I find this pretty secure).<p>Govt you are forced to write down these insanely long passwords with super complexity that cannot be cut and pasted that change very 30 or 60 days.<p>Because lost passwords are so common in these settings, the password reset process is usually a MASSIVE weakspot. I&#x27;ve seen it just be a phone call to a third party, you give them your username, they give you a new temp password - that&#x27;s literally it. And the passwords end up everywhere. In lots of documents that float around, emailed around etc etc. And lots of password sharing when you get locked out of a tool and it will take a long time to get a new account setup (months). Pretty soon the procedures manual also gets you root access to everything.
评论 #25421037 未加载
评论 #25421180 未加载
评论 #25421367 未加载
评论 #25421342 未加载
评论 #25426152 未加载
评论 #25422024 未加载
评论 #25423507 未加载
评论 #25424368 未加载
评论 #25421161 未加载
评论 #25421108 未加载
评论 #25424172 未加载
robocatover 4 years ago
More details: <a href="https:&#x2F;&#x2F;www.fireeye.com&#x2F;blog&#x2F;threat-research&#x2F;2020&#x2F;12&#x2F;evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html" rel="nofollow">https:&#x2F;&#x2F;www.fireeye.com&#x2F;blog&#x2F;threat-research&#x2F;2020&#x2F;12&#x2F;evasive...</a><p>“SolarWinds.Orion.Core.BusinessLayer.dll is a SolarWinds digitally-signed component of the Orion software framework that contains a backdoor that communicates via HTTP to third party servers. We are tracking the trojanized version of this SolarWinds Orion plug-in as SUNBURST.”<p>“ Multiple trojanzied updates were digitally signed from March - May 2020 and posted to the SolarWinds updates website. The trojanized update file is a standard Windows Installer Patch file that includes compressed resources associated with the update, including the trojanized SolarWinds.Orion.Core.BusinessLayer.dll component. Once the update is installed, the malicious DLL will be loaded by the legitimate SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe. After a dormant period of up to two weeks, the malware will attempt to resolve a subdomain of avsvmcloud[.]com.”<p>“This actor prefers to maintain a light malware footprint, instead preferring legitimate credentials and remote access for access into a victim’s environment.”<p>“In observed [trojan] traffic these HTTP response bodies attempt to appear like benign XML related to .NET assemblies” “Command data is spread across multiple strings that are disguised as GUID and HEX strings.”<p>Edit: Silly me, that was the first article on hn, see thread: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25413053" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25413053</a>
hn_throwaway_99over 4 years ago
&gt; Malicious code added to an Orion software update may have gone undetected by antivirus software and other security tools on host systems thanks in part to guidance from SolarWinds itself. In this support advisory, SolarWinds says its products may not work properly unless their file directories are exempted from antivirus scans and group policy object restrictions.<p>Ouch!
评论 #25421565 未加载
just_steve_hover 4 years ago
So far I&#x27;ve seen ZERO EVIDENCE. Reuters and the Washington Post have breathless claims of Russian hackers &quot;according to officials familiar with the matter.&quot; Uh huh.<p>Saying &quot;APT29&quot; or &quot;CozyBear&quot; doesn&#x27;t make the accusation any more credible.<p>If multiple US agencies are trumpeting the same story, you really must ask yourself &quot;Why? Why this? Why now?&quot;<p>It&#x27;s pretty amusing, in a depressing way, to see how quickly so many otherwise intelligent people can be made to snap to attention and fight the Russian Menace with a few anonymous government claims.
评论 #25427226 未加载
评论 #25423037 未加载
评论 #25427040 未加载
评论 #25422949 未加载
评论 #25430034 未加载
wonder_erover 4 years ago
Seems like a good time to plug an excellent book:<p><i>Countdown to Zero Day: Stuxnet and the Launch of the World&#x27;s First Digital Weapon</i> [0]<p>The US Government has spent two decades and hundreds of millions of dollars building tools to undermine the security of systems around the world, and withholding information from &quot;Industry&quot; that would help harden those systems.<p>I have no idea who &quot;did&quot; this, I don&#x27;t really care. The NSA has been loading this footgun for decades.<p>[0] <a href="https:&#x2F;&#x2F;www.amazon.com&#x2F;Countdown-Zero-Day-Stuxnet-Digital-ebook&#x2F;dp&#x2F;B00KEPLC08&#x2F;ref=tmm_kin_swatch_0?_encoding=UTF8&amp;qid=&amp;sr=" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com&#x2F;Countdown-Zero-Day-Stuxnet-Digital-eb...</a>
评论 #25422438 未加载
评论 #25427255 未加载
评论 #25426146 未加载
评论 #25423389 未加载
vngzsover 4 years ago
Since this is a supply chain attack on software downloads, I think it&#x27;s interesting to consider the implications for the security posture of a cloud-native organization. While cloud-native is commonly recognized as less secure (because the cloud provider could be hacked!), there are a few categories of attacks exclusive to onprem software deployments:<p>1. You misconfigure the onprem software, making it more insecure than the alternatives. This does not occur with SaaS products.<p>2. The software delivery system is tampered with, and you download and run malicious code on your systems with high privileges. If you don&#x27;t run it, this can&#x27;t happen.<p>Cloud deployments aren&#x27;t obviously safer, but they have clear advantages unless you are willing to pay top people to work on and secure each onprem deployment full-time.<p>NB: I don&#x27;t actually believe &quot;the cloud&quot; is fundamentally more or less secure than onprem deployments. Rather, I frequently hear people argue that a website being hacked - or the potential for it - justifies a movement to onprem, and I think this is (usually) false.
评论 #25423697 未加载
评论 #25426255 未加载
评论 #25423945 未加载
评论 #25423240 未加载
swalshover 4 years ago
So, am I reading this right? the Russian government had the ability to impersonate the credentials of ANYONE in the marjoity of the fortune 500, the US Government, the US DOD, and our telecomm infrastructure... and they likely had this access for a while.<p>How is this NOT an act of war?
评论 #25420976 未加载
评论 #25421034 未加载
评论 #25421615 未加载
评论 #25421183 未加载
评论 #25422372 未加载
评论 #25421069 未加载
评论 #25421019 未加载
评论 #25423989 未加载
评论 #25420842 未加载
评论 #25421460 未加载
评论 #25420889 未加载
评论 #25421010 未加载
评论 #25421289 未加载
评论 #25421317 未加载
评论 #25421578 未加载
评论 #25433556 未加载
评论 #25425717 未加载
评论 #25421359 未加载
评论 #25422183 未加载
评论 #25423114 未加载
评论 #25424708 未加载
评论 #25423041 未加载
评论 #25420833 未加载
评论 #25431442 未加载
评论 #25420995 未加载
评论 #25448643 未加载
评论 #25420926 未加载
评论 #25422520 未加载
评论 #25420942 未加载
评论 #25423906 未加载
评论 #25421121 未加载
pmlnrover 4 years ago
Sigh.<p>&quot;Engineers are expensive, so don&#x27;t build, buy!&quot;<p>How about... the middle way? Let your own engineers deploy open source, something you can verify, even audit, if you ever have to.<p>Ah, I forgot. Those usually don&#x27;t come with fat envelopes from the provider to the people making the decisions.
评论 #25426384 未加载
ethanolburnerover 4 years ago
Just to add, 15 mins ago Chris Bing from Reuters and other journalists confirmed the U.S. Department of Homeland Security to be the 3rd agency to be impacted [1].<p>I suspect there will likely be further agencies and of course private companies to come forward in the upcoming weeks&#x2F;months.<p>[1] <a href="https:&#x2F;&#x2F;twitter.com&#x2F;Bing_Chris&#x2F;status&#x2F;1338552048342753288" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;Bing_Chris&#x2F;status&#x2F;1338552048342753288</a>
dangover 4 years ago
The major earlier threads on this ongoing story are:<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25413053" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25413053</a><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25409416" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25409416</a>
dmitrygrover 4 years ago
This is why all this bullshit about &quot;let&#x27;s add a backdoor to all encryption just for the government&quot; is just that: bullshit. A year or so after it is added, it will be available to every government on earth this way, and a year after, on your favourite warez site...
hackinthebochsover 4 years ago
The widespread use of unvalidated automatic updates will go down as one of the biggest security blunders of the last decade.
评论 #25421647 未加载
评论 #25420948 未加载
评论 #25420952 未加载
评论 #25426194 未加载
评论 #25420884 未加载
brundolfover 4 years ago
&quot;SolarWinds says it has over 300,000 customers including:<p>-more than 425 of the U.S. Fortune 500<p>-all ten of the top ten US telecommunications companies<p>-all five branches of the U.S. military<p>-all five of the top five U.S. accounting firms<p>-the Pentagon<p>-the State Department<p>-the National Security Agency<p>-the Department of Justice<p>-The White House&quot;<p>Purely from a risk management perspective, it&#x27;s a <i>terrible</i> idea to have a single point of failure for <i>all of the above</i>
评论 #25430645 未加载
realmodover 4 years ago
Russia&#x27;s hacking&#x2F;software capabilities have always fascinated me. I might be out of the loop, but it very much feels like this &quot;online cold-war&quot; is very one-sided towards Russia, which is ridiculous given US capabilities. Though, this could be attributed to the US simply not getting caught.<p>Nonetheless, everything I&#x27;ve read points to Solarwinds conduct being borderline negligent. For example, they not only told customers to ignore inaccurate checksums but they also failed basic server security.
评论 #25422440 未加载
评论 #25426256 未加载
评论 #25424779 未加载
评论 #25426611 未加载
just_steve_hover 4 years ago
Companies that provide faulty software are &quot;magically&quot; exempt from liability – neat trick!
icedistilledover 4 years ago
Wow the hackers had free rein over basically any company that they wanted.<p>SolarWinds says it has over 300,000 customers including:<p>-more than 425 of the U.S. Fortune 500<p>-all ten of the top ten US telecommunications companies<p>-all five branches of the U.S. military<p>-all five of the top five U.S. accounting firms<p>-the Pentagon<p>-the State Department<p>-the National Security Agency<p>-the Department of Justice<p>-The White House
评论 #25424350 未加载
DougN7over 4 years ago
It should be noted that everyone with a recent version of SolarWinds installed is considered exposed - not just the US gov
Havocover 4 years ago
Ouch. Via a security provider. Thats ugly no matter how you look at it
评论 #25420997 未加载
评论 #25420911 未加载
koolbaover 4 years ago
Is this the same SolarWinds that owns Pingdom?<p><a href="https:&#x2F;&#x2F;www.solarwinds.com&#x2F;pingdom" rel="nofollow">https:&#x2F;&#x2F;www.solarwinds.com&#x2F;pingdom</a>
评论 #25422341 未加载
mikewarotover 4 years ago
For the last 15 years, I keep pushing information about Multi Level Secure Systems every time another incident like this happens. The fact that we haven&#x27;t been using them since the 1970s everywhere drives me nuts!<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Multilevel_security" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Multilevel_security</a><p>Their are Operating Systems in existence which could prevent this and almost every other breach. However, most technical people aren&#x27;t even aware of the fact that they CAN exist, and actively believe the opposite.<p>Hopefully Genode.org will have something useable for the average programmer like me, in a year or two, and I can use that as an existence proof.<p>Also, there are Data Diodes to help restrict what goes where.<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Unidirectional_network" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Unidirectional_network</a><p>I think we&#x27;ll finally get our act together in 2025 or so, 50 years after the first Multi Level Systems were finished.
meh206over 4 years ago
The &quot;Russia&quot; allegation sounds like an extremely weak &amp; repetitive claim made by people on a certain political side to divert attention away from their bad press for criminal behavior (to include all of the Chinese compromises that were recently revealed).<p>They&#x27;re playing a VERY dangerous game, as if they would rather the entire world be destroyed before facing the possibilities of justice (Gitmo, military court tribunals, and everything else that the EO from 9&#x2F;18 outlined).<p>The bottom line: the MSM has been full of $&amp;@T for quite some time, and this claim in Reuters is most likely more of the same.
评论 #25423196 未加载
hrgigerover 4 years ago
I wonder scanning their own uploads and validating checksums via cron job would have prevented or at least would give an early alert<p>Shameless disclosure: i was doing something similar (I do not have a plan to maintain long time) but would love to hear better solutions: <a href="https:&#x2F;&#x2F;github.com&#x2F;getsumio&#x2F;getsum" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;getsumio&#x2F;getsum</a>
mrfusionover 4 years ago
I’m completely out of the loop on what’s going on. Would anyone mind explaining like I’m from November and in high school?
评论 #25425436 未加载
plasmaover 4 years ago
SEC filings: SolarWinds says 18,000 customers were impacted by recent hack<p><a href="https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;sec-filings-solarwinds-says-18000-customers-are-impacted-by-recent-hack&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;sec-filings-solarwinds-says-18...</a>
csenseover 4 years ago
I tried the shareware version of Solar Winds back in the &#x27;90s. I guess I should be glad I didn&#x27;t buy the full version.<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Solar_Winds" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Solar_Winds</a>
评论 #25441827 未加载
andreasleyover 4 years ago
I wonder if this unintended transparency actually makes for a safer world. The cold war might have been shorter if both sides would have been able to see that their enemy does not intend to escalate the situation.
ummonkover 4 years ago
For a minute I misparsed the title and thought that the US Treeasury and Commerce departments&#x27; staff hacked their way around a SolarWinds compromise. That would have been cooler.
afrcncover 4 years ago
duplicate: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25413053" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25413053</a> and a few others more
评论 #25428623 未加载
throwerover 4 years ago
Have there been any statements &#x2F; postmortems released from SolarWinds itself yet?
rixedover 4 years ago
Let&#x27;s assume this is a case of state sponsored attack. If I was in charge of organising such an attack, I would make sure my employer would be on top of the list of victims. Would not do any actual damage to steal my own information and would tremendously help with attributing the attack to my enemy.
ineedasernameover 4 years ago
Could someone explain what a &quot;supply chain&quot; exploit is?
评论 #25421788 未加载
imchillybover 4 years ago
RELEVANT XKCD:<p><a href="https:&#x2F;&#x2F;xkcd.com&#x2F;936&#x2F;" rel="nofollow">https:&#x2F;&#x2F;xkcd.com&#x2F;936&#x2F;</a>
评论 #25422077 未加载
Dirlewangerover 4 years ago
These breaches will continue to happen, and happen...and happen until our limp-dick federal government gives a shit and starts to punish companies for their malicious malfeasance regarding IT security.
评论 #25424716 未加载
评论 #25423143 未加载
评论 #25426536 未加载
评论 #25426167 未加载
评论 #25423549 未加载
disgruntover 4 years ago
Consistent with the &quot;Most Secure Election Ever&quot; (tm) claims, Dominion Voting Systems use SolarWinds&#x27; Orion platform, too. [0]<p>[0]: <a href="https:&#x2F;&#x2F;www.theepochtimes.com&#x2F;dominion-voting-systems-uses-firm-that-was-hacked_3617507.html" rel="nofollow">https:&#x2F;&#x2F;www.theepochtimes.com&#x2F;dominion-voting-systems-uses-f...</a>
评论 #25426311 未加载
评论 #25427280 未加载
评论 #25427653 未加载
评论 #25424751 未加载
dukeofdoomover 4 years ago
So was the election hacked too? I&#x27;m a little confused how Biden can get 80 million votes, and almost no one watched his acceptance speech today. 40k views on youtube.<p>The 6k vote flipping in Michigan was claimed to be some sort of computer error. But why were the logs deleted? that seems like a hacker thing to do to delete the logs. A judge just released the audit report.<p><a href="https:&#x2F;&#x2F;www.freep.com&#x2F;story&#x2F;news&#x2F;politics&#x2F;elections&#x2F;2020&#x2F;12&#x2F;14&#x2F;michigan-company-officials-dispute-report-antrim-county-voting&#x2F;6538325002&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.freep.com&#x2F;story&#x2F;news&#x2F;politics&#x2F;elections&#x2F;2020&#x2F;12&#x2F;...</a>
评论 #25436120 未加载
评论 #25430156 未加载
jorblumeseaover 4 years ago
So basically, Russians had the highest level of access to every large company and most government agencies in the US? (Including defense, DOD, pentagon)<p>If so, this is on scale with the OPM hack in 2015. This is huge.<p>Smart to use the election timing while authorities were focused elsewhere.
评论 #25421288 未加载
trashcanover 4 years ago
This also came out today:<p><a href="https:&#x2F;&#x2F;mattermost.com&#x2F;blog&#x2F;coordinated-disclosure-go-xml-vulnerabilities&#x2F;" rel="nofollow">https:&#x2F;&#x2F;mattermost.com&#x2F;blog&#x2F;coordinated-disclosure-go-xml-vu...</a><p>It seems pretty likely that SolarWinds&#x27; SAML authentication was bypassed or escalated by this issue with Go&#x27;s encoding&#x2F;xml, and then used that to generate and distribute the trojaned SolarWind&#x27;s updates.
评论 #25423972 未加载
mxskellyover 4 years ago
When will people realize that slapping yet another startup&#x27;s tech stack onto yours isn&#x27;t going to magically fix anything and in fact just adds complexity and points of failure.<p>I&#x27;ve always done my best to err on the side of &quot;let&#x27;s try not to add yet another level of complexity&quot; and this strategy has yet to fail me.
评论 #25420766 未加载
评论 #25420777 未加载
评论 #25420953 未加载
评论 #25420697 未加载