Beautiful Virgin Islands

Friday, Nov 28, 2025

What We Think Know About suspected Russia's Latest Alleged Hack Of The U.S. Government

What We Think Know About suspected Russia's Latest Alleged Hack Of The U.S. Government

The list of affected agencies is growing by the day. The full extent of the damage is still not clear, and U.S. authorities have provided few details.
Russian government hackers are believed to be responsible for infiltrating computer systems at multiple U.S. agencies in recent months, including the Pentagon, the Department of Homeland Security and the Department of the Treasury, according to government agencies and media reports. Russia has denied the accusations.

The hack hinged on a vulnerability on a software monitoring product from SolarWinds, a company based in Austin, Texas. The company works widely with the federal government and hundreds of large U.S. companies. Many use SolarWinds' Orion software to monitor their computer networks.

SolarWinds has some 300,000 customers, but says "fewer than 18,000" installed the version of its Orion products earlier this year that now appear to have been compromised.

So far, the list of affected U.S. government entities includes: The Commerce Department; Department of Homeland Security; the Pentagon; the Treasury Department; the U.S. Postal Service; and the National Institutes of Health.

The incident is the latest in what has become a long list of suspected Russian electronic incursions into other nations – particularly the U.S. – under President Vladimir Putin. Multiple countries say Russia was previously found to have used hackers, bots and other means in attempts to influence elections in the U.S. and elsewhere.

Many U.S. national security agencies made major efforts to prevent Russia from interfering in this year's election. But those same agencies seem to have been blindsided by news that hackers — suspected to be Russia's foreign intelligence service, the SVR — were digging around inside U.S. government systems, possibly since the spring.

"It's as if you wake up one morning and suddenly realize that a burglar has been going in and out of your house for the last six months," said Glenn Gerstall, who was the National Security Agency's general counsel from 2015 to 2020.

Describing some of the detective work that's now taking place, he added, "You'd have to go back and look at every room to see what was taken, what might have been touched. And of course, that's just a horrifying thought."

The intruders were very careful to cover their tracks, Gerstall said.

"You couldn't tell that they came in, you couldn't tell that they left the back door open. You couldn't even tell necessarily when they came in, took a look around and when they left."

To carry out the attack, hackers exploited the supply chain that SolarWinds uses to distribute software updates. The company says it has proof that when it sent updates to customers between March and June 2020, the updates to the Orion products also included malware that gave hackers access.

Microsoft has now taken control of the domain name that hackers used to communicate with systems that were compromised by the Orion update, according to security expert Brian Krebs. The company's analysis, he adds, should help reveal the scope of the affected companies and agencies.

So far, some U.S. government departments and agencies have acknowledged they are investigating the breaches, but have provided few details. The White House has been silent about the suspected Russian hack.

"This SolarWinds hack is very problematic, very troublesome, because it's not at all clear exactly how we should respond," Gerstall said. Part of the problem, he added, is that it's not clear what the hackers did after gaining access.

"This is not a question of someone manipulating software to open dams or turn off electric grids," Gerstall said. "It's not even clear that this is necessarily an attack designed to steal intellectual property the way China, for example, has stolen everything from patents for solar panels to the blueprints for fighter jets."

The intrusion could simply be a case of espionage, he said, of one government trying to understand what their adversary is doing.

Here's what key players are saying about the case:

SolarWinds: The company says, "We have been advised that this incident was likely the result of a highly sophisticated, targeted, and manual supply chain attack by an outside nation state, but we have not independently verified the identity of the attacker."

In an SEC filing, the company says it is cooperating with the FBI, the U.S. intelligence community and other agencies to investigate the breach.

SolarWinds says it was alerted to an "attack vector" that targeted its emails and other office productivity tools. The company adds that it uses Microsoft Office 365 for its office tools.

SolarWinds says it's working with Microsoft to determine if any customer data was exfiltrated, but it adds that so far, they have not found signs of stolen data.

The company says customers affected by the vulnerability should upgrade to the latest versions of its software "as soon as possible to ensure the security of your environment."

FireEye: The cybersecurity firm announced last week that a "highly sophisticated state-sponsored adversary" stole its "red team" tools, which are used to test security vulnerabilities in its customers' computer networks. FireEye's clients include government agencies.

The company says it's working with the FBI, Microsoft, and SolarWinds. And in an update issued late Sunday, FireEye said it has identified signs of compromised security in "multiple organizations," dating back to the spring of 2020. It also confirms others' findings of a sophisticated and meticulous attack.

"Our analysis indicates that these compromises are not self-propagating; each of the attacks require meticulous planning and manual interaction," FireEye said.

Microsoft: "We believe this is nation-state activity at significant scale, aimed at both the government and private sector," the company said, as it shared some details about what it calls "the threat activity we've uncovered over the past weeks."

Microsoft says the malicious code in the SolarWinds update gave hackers a foothold in the target's computer network, "which the attacker can use to gain elevated credentials." It adds that its Microsoft Defender software can now detect the files used in the hack.

The company applauded other firms for being open and transparent in revealing the hacking attacks, saying it will help others boost their security. As for Microsoft itself, the company said that so far, it hasn't "found evidence of a successful attack" in its own systems.

Cybersecurity and Infrastructure Security Agency: CISA said on Sunday that it "is aware of active exploitation of SolarWinds Orion Platform software" that was released between March 2020 and June 2020. The agency is urging any affected organizations to take steps to detect intrusions, and take countermeasures.
Newsletter

Related Articles

Beautiful Virgin Islands
0:00
0:00
Close
"I Would Have Given Her a Kidney": She Lent Bezos’s Ex-Wife $1,000 — and Received Millions in Return
European States Approve First-ever Military-Grade Surveillance Network via ESA
UK to Slash Key Pension Tax Perk, Targeting High Earners Under New Budget
UK Government Announces £150 Annual Cut to Household Energy Bills Through Levy Reforms
UK Court Hears Challenge to Ban on Palestine Action as Critics Decry Heavy-Handed Measures
Investors Rush Into UK Gilts and Sterling After Budget Eases Fiscal Concerns
UK to Raise Online Betting Taxes by £1.1 Billion Under New Budget — Firms Warn of Fallout
Lamine Yamal? The ‘Heir to Messi’ Lost to Barcelona — and the Kingdom Is in a Frenzy
Warner Music Group Drops Suit Against Suno, Launches Licensed AI-Music Deal
HP to Cut up to 6,000 Jobs Globally as It Ramps Up AI Integration
MediaWorld Sold iPad Air for €15 — Then Asked Customers to Return Them or Pay More
UK Prime Minister Sir Keir Starmer Promises ‘Full-Time’ Education for All Children as School Attendance Slips
UK Extends Sugar Tax to Sweetened Milkshakes and Lattes in 2028 Health Push
UK Government Backs £49 Billion Plan for Heathrow Third Runway and Expansion
UK Gambling Firms Report £1bn Surge in Annual Profits as Pressure Mounts for Higher Betting Taxes
UK Shares Advance Ahead of Budget as Financials and Consumer Staples Lead Gains
Domino’s UK CEO Andrew Rennie Steps Down Amid Strategic Reset
UK Economy Stalls as Reeves Faces First Budget Test
UK Economy’s Weak Start Adds Pressure on Prime Minister Starmer
UK Government Acknowledges Billionaire Exodus Amid Tax Rise Concerns
UK Budget 2025: Markets Brace as Chancellor Faces Fiscal Tightrope
UK Unveils Strategic Plan to Secure Critical Mineral Supply Chains
UK Taskforce Calls for Radical Reset of Nuclear Regulation to Cut Costs and Accelerate Build
UK Government Launches Consultation on Major Overhaul of Settlement Rules
Google Struggles to Meet AI Demand as Infrastructure, Energy and Supply-Chain Gaps Deepen
Car Parts Leader Warns Europe Faces Heavy Job Losses in ‘Darwinian’ Auto Shake-Out
Arsenal Move Six Points Clear After Eze’s Historic Hat-Trick in Derby Rout
Wealthy New Yorkers Weigh Second Homes as the ‘Mamdani Effect’ Ripples Through Luxury Markets
Families Accuse OpenAI of Enabling ‘AI-Driven Delusions’ After Multiple Suicides
UK Unveils Critical-Minerals Strategy to Break China Supply-Chain Grip
Taylor Swift’s “The Fate of Ophelia” Extends U.K. No. 1 Run to Five Weeks
UK VPN Sign-Ups Surge by Over 1,400 % as Age-Verification Law Takes Effect
Former MEP Nathan Gill Jailed for Over Ten Years After Taking Pro-Russia Bribes
Majority of UK Entrepreneurs Regard Government as ‘Anti-Business’, Survey Shows
UK’s Starmer and US President Trump Align as Geneva Talks Probe Ukraine Peace Plan
UK Prime Minister Signals Former Prince Andrew Should Testify to US Epstein Inquiry
Royal Navy Deploys HMS Severn to Shadow Russian Corvette and Tanker Off UK Coast
China’s Wedding Boom: Nightclubs, Mountains and a Demographic Reset
Fugees Founding Member Pras Michel Sentenced to 14 Years in High-Profile US Foreign Influence Case
WhatsApp’s Unexpected Rise Reshapes American Messaging Habits
United States: Judge Dressed Up as Elvis During Hearings – and Was Forced to Resign
Johnson Blasts ‘Incoherent’ Covid Inquiry Findings Amid Report’s Harsh Critique of His Government
Lord Rothermere Secures £500 Million Deal to Acquire Telegraph Titles
Maduro Tightens Security Measures as U.S. Strike Threat Intensifies
U.S. Envoys Deliver Ultimatum to Ukraine: Sign Peace Deal by Thursday or Risk Losing American Support
Zelenskyy Signals Progress Toward Ending the War: ‘One of the Hardest Moments in History’ (end of his business model?)
U.S. Issues Alert Declaring Venezuelan Airspace a Hazard Due to Escalating Security Conditions
The U.S. State Department Announces That Mass Migration Constitutes an Existential Threat to Western Civilization and Undermines the Stability of Key American Allies
Students Challenge AI-Driven Teaching at University of Staffordshire
Pikeville Medical Center Partners with UK’s Golisano Children’s Network to Expand Pediatric Care
×