Australian News

Australian news and media publication

An alarming new alarm issued by the cyber arm of the US Department of Homeland Security revealed that Russian hackers suspected They used a variety of unidentified tactics and not just a single compromised software program from a massive and ongoing intrusion campaign on government agencies, private companies, and critical infrastructure entities.
Specifically, the Cybersecurity and Infrastructure Safety Agency (CISA) said it has determined that the SolarWinds Orion software vulnerability revealed earlier this week is not the only way hackers engaged a variety of online networks – warning that, in some cases, the victims appear to have been raped even though they never used the problematic software.
File photo of the United States Department of the Treasury building in Washington. Officials said the hackers breached their computer systems. (AP)

The news will likely only compound already growing concerns about the scale and scope of the data breach, which CISA says “poses a serious risk” to both public and private sector networks.

“CISA has determined that this threat represents a serious risk to the federal government and state, local, tribal and territorial governments, as well as to critical infrastructure entities and other private sector organizations,” said the alert issued by the agency. “CISA expects that removing this threat actor from compromised environments will be very complex and challenging for organizations.”

The agency also acknowledged that the hackers used “tactics, techniques and procedures that have not yet been discovered,” adding that it continues to investigate whether and how other intrusion methods may have been used since the campaign began months ago.

The analysis comes as the list of US agencies, private companies and other entities affected by the hacking campaign continues to grow.

Hours after the publication of the CISA alert, the US Department of Energy said it had evidence that hackers accessed some of its networks using the same malware associated with the ongoing data breach that already affects nearly half a dozen federal agencies.

A file photo of the FireEye offices in California. The cybersecurity firm said it was hacked by what it believes was a national government. (AP)

The department maintains that the impact has “isolated commercial networks” and “has not affected the essential national security functions of the Department’s mission, including the National Nuclear Security Administration (NNSA),” which oversees the weapons arsenal. nuclear power of the nation.

Department of Energy spokeswoman Shaylyn Hynes also said that once the department identified its vulnerable software, “immediate steps were taken to mitigate the risk and all software identified as vulnerable to this attack was disconnected from the DOE network.” .

Leave a Reply

Your email address will not be published. Required fields are marked *