• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Saturday, April 11, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » U.S. scrambles to assess damage from nation-state cyberattack

U.S. scrambles to assess damage from nation-state cyberattack

December 17, 2020
in All
A A

U.S. government officials warned that the cyberattack identified earlier this week has compromised dozens of federal government networks and likely thousands of private networks globally.

The FBI, the Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI) announced a Cyber Unified Coordination Group (UCG) to coordinate a whole-of-government response to the infiltration of U.S. government networks arising from the SolarWinds backdoor hack.

CISA issued an Emergency Directive instructing federal civilian agencies to immediately disconnect or power down affected SolarWinds Orion products from their network.

CISA said the infiltration “poses a grave risk to the Federal Government and state, local, tribal, and territorial governments as well as critical infrastructure entities and other private sector organizations.”

Some notes from CISA about the attack:

  • Compromises began at least as early as March 2020
  • This is a patient, well-resourced, and focused adversary that has sustained long duration activity on victim networks.
  • The SolarWinds Orion supply chain compromise is not the only initial infection vector this APT actor leveraged.
  • Not all organizations that have the backdoor delivered through SolarWinds Orion have been targeted by the adversary with follow-on actions.
  • Organizations with suspected compromises need to be highly conscious of operational security, including when engaging in incident response activities and planning and implementing remediation plans. 
  • The adversary is making extensive use of obfuscation to hide their C2 communications. 
  • CISA has observed the threat actor adding authentication tokens and credentials to highly privileged Active Directory domain accounts as a persistence and escalation mechanism. In many instances, the tokens enable access to both on-premise and hosted resources.

Some recommendations from CISA:

  • Out-of-band communications guidance for staff and leadership;
  • An outline of what “normal business” is acceptable to be conducted on the suspect network;
  • A call tree for critical contacts and decision making; and
  • Considerations for external communications to stakeholders and media.

https://www.cisa.gov/ 

https://us-cert.cisa.gov/ncas/alerts/aa20-352a

Microsoft President Brad Smith stated “this latest cyber-assault is effectively an attack on the United States and its government and other critical institutions, including security firms.” 

Microsoft also noted that the initial list of victims includes not only government agencies, but security and other technology firms as well as non-governmental organizations.

https://blogs.microsoft.com/on-the-issues/2020/12/17/cyberattacks-cybersecurity-solarwinds-fireeye/

  • On December 13, FireEye discovered a supply chain attack trojanizing SolarWinds Orion business software updates in order to distribute malware. The attacker is using multiple techniques to evade detection and obscure their activity, which includes espionage and data theft. FireEye has released signatures to detect this threat actor and supply chain attack in the wild. 

https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html

Tags: Blueprint columnsSecurity
ShareTweetShare
Previous Post

Linux Foundation marks first release of DENT Network OS

Next Post

U.S. restricts exports of 10nm technology to China’s SMIC

Staff

Staff

Related Posts

NIST Finalizes Quantum-Resistant Encryption Standards
Optical

Nokia Secures FIPS 140-3 Certification for Layer 1 Optical Transport in Quantum Era

November 3, 2024
Kinetic Reports Vandalism of Fiber Cables in Kentucky
All

WSJ: Salt Typhoon Cyber Espionage Campaign Targets U.S.

October 6, 2024
NTT doubles down with optical research lab in Silicon Valley
Quantum

Tech Update: DigiCert on the Post-Quantum Threat

May 7, 2024
Arista unveils Zero Trust Networking Vision with Open API
Enterprise

Arista unveils Zero Trust Networking Vision with Open API

November 9, 2023
Worldcoin Foundation launches its digital ID and currency for AI era
Financials

Worldcoin Foundation launches its digital ID and currency for AI era

July 24, 2023
Enterprise Networking Alphabet Soup: Navigating Multi-Cloud with Alkira
Enterprise

Enterprise Networking Alphabet Soup: Navigating from SD-WAN to SASE for Secure Hybrid Work

July 18, 2023
Next Post
U.S. restricts exports of 10nm technology to China’s SMIC

U.S. restricts exports of 10nm technology to China's SMIC

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version