SolarWinds hires former Trump cybersecurity chief Chris Krebs



[ad_1]

The US tech company, at the center of the biggest hacking in recent history, has hired recently sacked US government cybersecurity chief Chris Krebs to help deal with the fallout.

SolarWinds, the Texas-based company whose software has been exploited by suspected Russian hackers to spy on governments and businesses around the world, has appointed Mr. Krebs as an independent consultant.

Mr Krebs was in charge of the US cybersecurity agency until November, when he was pulled on twitter by outgoing President Donald Trump for disputing his claims that the election was compromised by fraud.

He will work for SolarWinds to help coordinate the company’s crisis response, alongside new business partner Alex Stamos, a professor at Stanford University and former Facebook security chief. The pair told the Financial Times that it could be years before all compromised systems are completely secure again.

Mr Krebs said: “This has been a multi-year effort of one of the best and most sophisticated intelligence operations in the world.

“It was only a small part of a much larger and very sophisticated plan, so I would expect more businesses to have been compromised; more techniques that we haven’t found yet. . . There is so much more to write, I think, in this chapter of Russian cyber intelligence operations.

Investigators are working to establish the scale and scope of the ongoing campaign, with some experts suggesting it could go back years.

SolarWinds said in December that 18,000 of its customers may have been exposed to hackers, who hijacked one of their popular software in March. The hackers are believed to have hand-selected specific targets from among these 18,000, masquerading as legitimate staff in their systems to gain access to confidential information stored in the cloud.

The company has been accused of not being open enough about the scale or method of the attack – a criticism that Mr Stamos tacitly acknowledged, while praising FireEye, the cybersecurity firm that itself fell victim.

“FireEye has been extremely transparent and it has worked really well for them. There was less of that [from] other companies involved, and that means there are some leaks that may or may not be true, ”he said.

US intelligence officials said this week they had identified “less than 10” compromised federal agencies. So far, the departments of trade, energy and justice have confirmed that they are victims. Hackers also snooped on dozens of US Treasury email accounts and gained access to systems used by some of the department’s top officials.

The electronic filing system used by federal courts has also been compromised, the US justice said Thursday.

Microsoft last week said in a blog post that the same hackers had accessed some of the internal source code underlying its proprietary software, although they did not modify it or access customer data.

Kicking hackers out of systems can be another battle. Mr Stamos said attackers were likely to have embedded hidden pieces of code that would allow them to continue snooping on agencies and businesses for years to come.

“The metaphor I use is harvesting iron, for Belgian and French farmers in the spring,” he said. “After the rains, they go to their fields and they still find shells from WWI and WWII. That’s what it’s gonna be for a while.

While Mr. Trump played down the idea that Russian hackers are to blame and even pointed the finger at China, US intelligence agencies said the perpetrators were “probably of Russian origin.”

Mr Krebs added that there was “no question” in the intelligence community that Russia’s foreign intelligence service, the SVR, was responsible.

Some members of Congress have called on the United States to retaliate against the perpetrator accordingly, but Mr Krebs said that based on what is known about the attack so far, it fell under the category of espionage, a claim also made by US intelligence agencies.

“The United States has signaled on the world stage, time and time again, that this type of behavior is in fact acceptable, so I don’t expect the United States to respond,” Krebs said.

But he added that any escalation on the part of hackers should provoke a “dramatic” and “proportional” response from the US government.



[ad_2]

Source link