Please disable your adblock and script blockers to view this page

Russia?s hacking frenzy is a reckoning


Profile
Homeland Security
Commerce
Treasury
State
SolarWinds Orion
Authentic8
the National Security Council
D-Oregon
Congress
NotPetya
the Senate Intelligence Committee
Rendition InfosecThe US
Einstein
Government Accountability Office
NSA
GAO
Federal Agencies Need
Take Urgent Action to Manage Supply Chain Risks
FireEye."It
frankly."But
Rendition Infosec's
Columbia University
Healey
Big Tech’s
Condé Nast
Affiliate Partnerships


Lily Hay NewmanTo
Matt Ashburn
Ron Wyden
Sherrod Brown
Steve Mnuchin
Mark Warner
Williams
Einstein
Jake Williams
John Hultquist
Jason Healey


Russian
D
🎮 WIRED Games

No matching tags


nowhere."On


United States
Russia
US
Ohio
D-Virginia
🏽‍

No matching tags

Positivity     37.00%   
   Negativity   63.00%
The New York Times
SOURCE: https://www.wired.com/story/russia-hack-supply-chain-reckoning/
Write a review: Ars Technica
Summary

Such "supply chain" attacks have been used in government espionage and destructive hacking before, including by Russia. "We should make clear that there will be consequences for any broader impact on private networks, critical infrastructure, or other sensitive sectors.”"It's like the attacker teleports in there out of nowhere."Jake Williams, Rendition InfosecThe US has invested heavily in threat detection; a multibillion-dollar system known as Einstein patrols the federal government's networks for malware and indications of attack. It's like the attacker teleports in there out of nowhere."On Tuesday, the GAO publicly released another report, one that it had distributed within the government in October: “Federal Agencies Need to Take Urgent Action to Manage Supply Chain Risks.” By then, the Russian assault had been active for months. One potential path would be to build highly segmented networks with “zero trust,” so attackers can't gain very much even if they do penetrate some systems, but it's proven difficult in practice to get large organizations to commit to that model."You have to put a great deal of trust in your software vendors, and every one of them 'takes security seriously,'" says Williams.Without a fundamentally new approach to securing data, though, attackers will have the upper hand.

As said here by Lily Hay Newman, wired.com