Skip to main content

SolarWinds hack may have been more damaging than previously thought

Representational image of a cybercriminal
(Image credit: Pixabay)

The SolarWinds hackers reportedly got their hands on information about counterintelligence investigations, the US’ policy on sanctioning Russian individuals and its response to COVID-19.

The campaign was widely publicized when it was eventually outed late last year. The US government pins the attack on Russia’s SVR foreign intelligence service, which denies any involvement in the campaign.

Despite months of investigation, which has identified several targets, including SolarWinds and Microsoft, there has been virtually no revelations about the intentions of the attackers. 

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

However, anonymous sources have now told Reuters that the attackers were hoping to gather intelligence on the US government’s decision-making policy.

Intelligence loss

Microsoft recently revealed Russia as a leading proponent for conducting cyber crimes using state-sponsored actors. 

In their annual Digital Defense Report, Microsoft shared that the SolarWinds attackers were digging for government material on sanctions and other Russia-related policies, along with information about the methods the country employs to catch Russian hackers.

Anonymous sources involved in the US government’s investigation into the matter revealed that they could see the terms that the attackers used as they combed through the US government files, and one of the keywords searched was “sanctions.”

Speaking to Reuters, Chris Krebs, former head of US’ Cybersecurity and Infrastructure Security Agency (CISA) and now an adviser to various companies including SolarWinds, said the combined descriptions of the attackers’ goals sounds logical. 

During the SolarWinds campaign the attackers managed to breach about nine federal agencies, read emails of various government departments, made away with confidential source code from Microsoft, and other companies, and more.

Despite all this, one of the people involved in the investigation went as far as to tell Reuters that the exposure of counter-intelligence matters being pursued against Russia, was the worst of the losses.

Via Reuters

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.