說起最近波及范圍最廣的網(wǎng)絡攻擊事件,我們不禁想到了德州奧斯丁一家成立了20年、名為SolarWinds的軟件制造商。這家公司在科技界以外鮮有人知,但其客戶清單則涵蓋美國軍方各個部門以及《財富》美國500強五分之四的企業(yè)。
很多客戶發(fā)現(xiàn)自己也被卷入了攻擊,因為涉嫌此次攻擊的俄羅斯黑客在SolarWinds一款備受歡迎的軟件產(chǎn)品中植入了一個漏洞。該軟件旨在讓用戶一目了然地查看讓其業(yè)務正常運行的各類應用。
SolarWinds在周一向美國證券交易委員會提交的文件中稱,公司認為其監(jiān)控產(chǎn)品可能讓其多達1.8萬名客戶的服務器受到了攻擊。這些客戶包括全球政府機構以及全球一些最大的公司。
文件稱:“公司被告知遭到網(wǎng)絡攻擊,黑客在公司旗下Orion監(jiān)控產(chǎn)品中植入了一個漏洞。在出現(xiàn)和激活之后,該漏洞可能會允許攻擊者滲透運行Orion產(chǎn)品的服務器。SolarWinds獲悉,這次事件可能源于美國之外的國家所發(fā)起的高度復雜、目標明確的手動供應鏈攻擊?!?/p>
SolarWinds的股價在周一下跌了17%,是其2018年10月上市以來的最高跌幅,后又于周二早間下跌了6%。SolarWinds稱,自己已告知相關客戶規(guī)避舉措,并將于12月15日提供額外的“熱修復”升級。
與俄羅斯政府關聯(lián)的黑客組織APT 29是此次攻擊的懷疑對象。路透社稱,美國商務部受到了攻擊,國土安全部和財政部亦未能幸免。
這次全球性的黑客運動還包括12月8日對網(wǎng)絡安全公司FireEye的網(wǎng)絡攻擊。
俄羅斯大使館否認與此次黑客攻擊有任何關系,稱俄羅斯“并未在網(wǎng)絡領域開展任何侵犯行動。”
政府和企業(yè)如今正試圖弄清楚:這個安全災難是如何產(chǎn)生的?此外,這家由兄弟兩人于上個世紀90年代創(chuàng)建的不知名公司如今似乎成為了疑似俄羅斯首要情報部門的重點關注對象,原因何在?
從SolarWinds的網(wǎng)站上可以看到該公司擁有30多萬名客戶。在美國之外,SolarWinds的客戶還包括英國國家醫(yī)療服務體系(NHS)、歐洲議會和北約組織。
SolarWinds官網(wǎng)在1月發(fā)布的一篇文章顯示,大衛(wèi)和唐納德·楊斯兄弟二人于20多年前在塔爾薩創(chuàng)建了這家公司,他們此前曾聽朋友“抱怨說在管理其基礎設施時存在諸多具體問題。這些問題都是科技領域老生常談的一部分罷了?!疄槭裁礇]有人開發(fā)一款能夠解決所有問題的工具?!’不同之處在于,這兩兄弟決定著手解決這個問題?!?/p>
SolarWinds為政府機構和私人領域的公司提供網(wǎng)絡監(jiān)控服務,并在領英頁面將自己標榜為“所有人的信息技術”。SolarWinds已經(jīng)刪除了自家列舉其美國政府和私營客戶名單的網(wǎng)頁。
其Orion產(chǎn)品是一款強大、重要的監(jiān)控工具,能夠讓計算機系統(tǒng)管理員通過一覽表的形式查看公司或機構網(wǎng)絡的狀況。因為Orion能夠提供有關整個網(wǎng)絡的信息,它還擁有訪問網(wǎng)絡敏感部分的權限。
Obsidian Security的首席技術官本?約翰遜說:“它能夠提供整個網(wǎng)絡的可視度,并允許人們在發(fā)現(xiàn)服務器或路由器出現(xiàn)問題時迅速做出響應。然而,如果你嘗試對系統(tǒng)和交通進行跨國監(jiān)控,就得擁有高度信任的訪問權限?!?/p>
Gartner Inc.的數(shù)據(jù)顯示,SolarWinds并非是什么知名企業(yè),但它是排名前三的IT運營軟件開發(fā)商,僅次于 Splunk Inc.和IBM。SolarWinds的其他主要競爭對手是思科和微軟。
FireEye和微軟發(fā)布的博客稱,黑客突破了Orion的升級系統(tǒng),在其中植入了偽裝成正當Orion升級程序的惡意代碼。SolarWind稱,這個惡意漏洞存在于3月-6月的升級程序中。根據(jù)FireEye的說法,植入惡意代碼的升級程序甚至會將偷竊的數(shù)據(jù)儲存在Orion軟件中。結果就是,黑客可以以看似正當?shù)纳矸莞Q探公司的網(wǎng)絡。
馬里蘭州網(wǎng)絡安全公司Prevailion Inc.創(chuàng)始人兼首席執(zhí)行官卡里姆?希加茲稱,截至周一中午,這個惡意升級程序依然可以從SolarWinds的網(wǎng)站下載。希加茲表示,他的團隊對比了網(wǎng)站發(fā)布的下載與顯示更新程序已遭篡改的安全警告,二者完全匹配。
當日早些時候,SolarWinds曾發(fā)表聲明,稱6月以后下載的產(chǎn)品并不含有這一漏洞,但這一聲明似乎與Prevailion的發(fā)現(xiàn)相左。當被問及惡意文件依然存在這一問題時, SolarWinds對此予以否認,并建議彭博記者查看公司向美國證券交易委員會提交的聲明。Prevailion公司稱,在郵件往來之后,SolarWinds刪除了此前存放惡意軟件更新的網(wǎng)頁。當前的狀況是,“該網(wǎng)頁無法顯示”。
隨著各大公司和政府梳理其計算機系統(tǒng),尋找黑客的蛛絲馬跡,受害者的數(shù)量可能會增加。
FireEye稱:“受害者包括政府、咨詢公司、科技公司、電信公司以及北美、歐洲、亞洲和中東的開采公司。我們預計,其他國家和垂直行業(yè)亦存在受害者?!?/p>
這場黑客攻擊的受損范圍依然未能得到確定。俄羅斯黑客很有可能優(yōu)先獲取的是最寶貴的情報目標,這意味著它們還沒來得及滲透SolarWinds的每一家客戶。約翰遜說:“一旦發(fā)現(xiàn)遭到攻擊,你就會開始調動一切資源來應對,這一周時間將夠你受的?!保ㄘ敻恢形木W(wǎng))
譯者:馮豐
審校:夏林
說起最近波及范圍最廣的網(wǎng)絡攻擊事件,我們不禁想到了德州奧斯丁一家成立了20年、名為SolarWinds的軟件制造商。這家公司在科技界以外鮮有人知,但其客戶清單則涵蓋美國軍方各個部門以及《財富》美國500強五分之四的企業(yè)。
很多客戶發(fā)現(xiàn)自己也被卷入了攻擊,因為涉嫌此次攻擊的俄羅斯黑客在SolarWinds一款備受歡迎的軟件產(chǎn)品中植入了一個漏洞。該軟件旨在讓用戶一目了然地查看讓其業(yè)務正常運行的各類應用。
SolarWinds在周一向美國證券交易委員會提交的文件中稱,公司認為其監(jiān)控產(chǎn)品可能讓其多達1.8萬名客戶的服務器受到了攻擊。這些客戶包括全球政府機構以及全球一些最大的公司。
文件稱:“公司被告知遭到網(wǎng)絡攻擊,黑客在公司旗下Orion監(jiān)控產(chǎn)品中植入了一個漏洞。在出現(xiàn)和激活之后,該漏洞可能會允許攻擊者滲透運行Orion產(chǎn)品的服務器。SolarWinds獲悉,這次事件可能源于美國之外的國家所發(fā)起的高度復雜、目標明確的手動供應鏈攻擊?!?/p>
SolarWinds的股價在周一下跌了17%,是其2018年10月上市以來的最高跌幅,后又于周二早間下跌了6%。SolarWinds稱,自己已告知相關客戶規(guī)避舉措,并將于12月15日提供額外的“熱修復”升級。
與俄羅斯政府關聯(lián)的黑客組織APT 29是此次攻擊的懷疑對象。路透社稱,美國商務部受到了攻擊,國土安全部和財政部亦未能幸免。
這次全球性的黑客運動還包括12月8日對網(wǎng)絡安全公司FireEye的網(wǎng)絡攻擊。
俄羅斯大使館否認與此次黑客攻擊有任何關系,稱俄羅斯“并未在網(wǎng)絡領域開展任何侵犯行動。”
政府和企業(yè)如今正試圖弄清楚:這個安全災難是如何產(chǎn)生的?此外,這家由兄弟兩人于上個世紀90年代創(chuàng)建的不知名公司如今似乎成為了疑似俄羅斯首要情報部門的重點關注對象,原因何在?
從SolarWinds的網(wǎng)站上可以看到該公司擁有30多萬名客戶。在美國之外,SolarWinds的客戶還包括英國國家醫(yī)療服務體系(NHS)、歐洲議會和北約組織。
SolarWinds官網(wǎng)在1月發(fā)布的一篇文章顯示,大衛(wèi)和唐納德·楊斯兄弟二人于20多年前在塔爾薩創(chuàng)建了這家公司,他們此前曾聽朋友“抱怨說在管理其基礎設施時存在諸多具體問題。這些問題都是科技領域老生常談的一部分罷了?!疄槭裁礇]有人開發(fā)一款能夠解決所有問題的工具?!’不同之處在于,這兩兄弟決定著手解決這個問題?!?/p>
SolarWinds為政府機構和私人領域的公司提供網(wǎng)絡監(jiān)控服務,并在領英頁面將自己標榜為“所有人的信息技術”。SolarWinds已經(jīng)刪除了自家列舉其美國政府和私營客戶名單的網(wǎng)頁。
其Orion產(chǎn)品是一款強大、重要的監(jiān)控工具,能夠讓計算機系統(tǒng)管理員通過一覽表的形式查看公司或機構網(wǎng)絡的狀況。因為Orion能夠提供有關整個網(wǎng)絡的信息,它還擁有訪問網(wǎng)絡敏感部分的權限。
Obsidian Security的首席技術官本?約翰遜說:“它能夠提供整個網(wǎng)絡的可視度,并允許人們在發(fā)現(xiàn)服務器或路由器出現(xiàn)問題時迅速做出響應。然而,如果你嘗試對系統(tǒng)和交通進行跨國監(jiān)控,就得擁有高度信任的訪問權限?!?/p>
Gartner Inc.的數(shù)據(jù)顯示,SolarWinds并非是什么知名企業(yè),但它是排名前三的IT運營軟件開發(fā)商,僅次于 Splunk Inc.和IBM。SolarWinds的其他主要競爭對手是思科和微軟。
FireEye和微軟發(fā)布的博客稱,黑客突破了Orion的升級系統(tǒng),在其中植入了偽裝成正當Orion升級程序的惡意代碼。SolarWind稱,這個惡意漏洞存在于3月-6月的升級程序中。根據(jù)FireEye的說法,植入惡意代碼的升級程序甚至會將偷竊的數(shù)據(jù)儲存在Orion軟件中。結果就是,黑客可以以看似正當?shù)纳矸莞Q探公司的網(wǎng)絡。
馬里蘭州網(wǎng)絡安全公司Prevailion Inc.創(chuàng)始人兼首席執(zhí)行官卡里姆?希加茲稱,截至周一中午,這個惡意升級程序依然可以從SolarWinds的網(wǎng)站下載。希加茲表示,他的團隊對比了網(wǎng)站發(fā)布的下載與顯示更新程序已遭篡改的安全警告,二者完全匹配。
當日早些時候,SolarWinds曾發(fā)表聲明,稱6月以后下載的產(chǎn)品并不含有這一漏洞,但這一聲明似乎與Prevailion的發(fā)現(xiàn)相左。當被問及惡意文件依然存在這一問題時, SolarWinds對此予以否認,并建議彭博記者查看公司向美國證券交易委員會提交的聲明。Prevailion公司稱,在郵件往來之后,SolarWinds刪除了此前存放惡意軟件更新的網(wǎng)頁。當前的狀況是,“該網(wǎng)頁無法顯示”。
隨著各大公司和政府梳理其計算機系統(tǒng),尋找黑客的蛛絲馬跡,受害者的數(shù)量可能會增加。
FireEye稱:“受害者包括政府、咨詢公司、科技公司、電信公司以及北美、歐洲、亞洲和中東的開采公司。我們預計,其他國家和垂直行業(yè)亦存在受害者。”
這場黑客攻擊的受損范圍依然未能得到確定。俄羅斯黑客很有可能優(yōu)先獲取的是最寶貴的情報目標,這意味著它們還沒來得及滲透SolarWinds的每一家客戶。約翰遜說:“一旦發(fā)現(xiàn)遭到攻擊,你就會開始調動一切資源來應對,這一周時間將夠你受的?!保ㄘ敻恢形木W(wǎng))
譯者:馮豐
審校:夏林
At the epicenter of the most sprawling cyber-attack in recent memory is a two-decade-old, Austin, Tex.-based software maker called SolarWinds. Little known outside of tech circles, its customer list boasts of every branch of the U.S. military and four-fifths of the Fortune 500.
Many of those customers found themselves ensnared in the attack because suspected Russian hackers inserted a vulnerability into a popular SolarWinds’ software product, designed to give users a bird’s eye view of the varied web of applications that keep their operations humming.
In a filing to the U.S. Securities and Exchange Commission on Monday, SolarWinds said it believed its monitoring products could have been used to compromise the servers of as many as 18,000 of its customers. Those clients include government agencies around the globe and some of the world’s largest corporations.
The company “has been made aware of a cyber-attack that inserted a vulnerability within its Orion monitoring products which, if present and activated, could potentially allow an attacker to compromise the server on which the Orion products run,” according to the filing. “SolarWinds has been advised that this incident was likely the result of a highly sophisticated, targeted and manual supply chain attack by an outside nation state.”
SolarWinds fell 6% in early trading Tuesday. The company fell 17% on Monday, the worst drop since it went public in October 2018. The company said it has sent mitigation steps to relevant customers and is providing an additional “hotfix” update Dec. 15.
APT 29, a hacking group linked to the Russian government, is suspected of being behind the breach. The Department of Commerce was breached, as were the departments of Homeland Security and Treasury, Reuters reported.
The global hacking campaign also included the Dec. 8 cyber-attack on the cybersecurity firm FireEye.
The Russian Embassy has denied any involvement in the hack, saying that Russia “does not conduct offensive operations in the cyber domain.”
Governments and companies are now racing to determine how such a security disaster materialized, and how it is that an obscure company founded by two brothers in the 1990s now appears to be at the heart of a potentially major Russian intelligence coup.
According to its website, SolarWinds has more than 300,000 customers. Outside the U.S., SolarWinds has picked up contracts for the U.K. National Health Service, European Parliament and NATO, according to its website.
The company was founded in Tulsa more than two decades ago by brothers David Yonce and Donald Yonce after they heard friends “griping about a long, specific list of frustrations managing their infrastructures,” according to an article from January on the company’s website. “They were part of the same perennial discussion we all share in tech. ‘Why can’t somebody just make a tool that X?!’ The difference was they decided to do something about it.”
SolarWinds provides network monitoring needs for government agencies and private sector companies, marketing itself on its LinkedIn page as “Everybody’s IT.” SolarWinds has taken down its webpage that details its U.S. government and private-sector clients.
Its Orion product is a powerful and important monitoring tool, allowing computer systems administrators to see the status of a company or organization’s network at a glance. Because Orion provides information on the entire network, it also has privileged access to sensitive parts of the network.
“It gives you visibility across our entire network and allows you to quickly respond when a server or router goes down,” said Ben Johnson, chief technology officer of Obsidian Security. “But if you’re trying to do global monitoring of systems and traffic, that has very trusted access.”
Hardly a household name, SolarWinds is the number three maker of IT operations software, behind Splunk Inc. and International Business Machines Corp., according to data provided by Gartner Inc. SolarWinds’ other main competitors are Cisco Systems Inc. and Microsoft.
Hackers penetrated Orion’s update system, introducing malicious code disguised as legitimate Orion updates, according to blog posts by FireEye and Microsoft Corp. The malicious vulnerability existed in updates between March and June, the company said. The hacking tool embedded within the update even stored stolen data within the Orion software as to evade detection, according to FireEye. The result was that hackers could snoop on a company’s network all while appearing as legitimate traffic.
As of mid-day Monday, the malicious update was still available for download on SolarWind’s website, according to Karim Hijazi, founder and chief executive of Prevailion Inc., a Maryland-based cybersecurity firm. Hijazi said his team compared the available download with security alerts identifying the tampered update, and it’s an exact match.
That appears to contradict a statement the company made earlier in the day that Orion products downloaded after June didn’t contain the vulnerability. When asked about continued access to the malicious file, SolarWinds denied the claim and referred a Bloomberg reporter back to the company’s statement to the SEC. Following the email exchange, the web page that previously hosted the malicious software update was taken down, Prevailion said. It now reads, “Not found.”
The number of victims is likely to climb as companies and governments comb their computer systems for traces of the hackers.
“The victims have included government, consulting, technology, telecom and extractive entities in North America, Europe, Asia and the Middle East,” according to FireEye. “We anticipate there are additional victims in other countries and verticals.”
The breadth of the damage caused by the hacking campaign is still unknown. The Russian hackers most likely prioritized the most valuable intelligence targets first, meaning it wouldn’t have had time to penetrate every SolarWinds customer. “Once you’re discovered, that’s when you start to pull everything you can,” Johnson said. “It’s going to be a crazy week.”