General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsCISA just issued a rare emergency directive
Link to tweet
Dustin Volz
@dnvolz
New: CISA just issued a rare emergency directive instructing federal civilian agencies to review their networks and immediately power down SolarWinds products, saying the hack "poses unacceptable risks to the security of federal networks." https://wsj.com/articles/agencies-hacked-in-foreign-cyber-espionage-campaign-11607897866
Image
Link to tweet
Cybersecurity and Infrastructure Security Agency
@CISAgov
JUST RELEASED: Emergency Directive 21-01 calls on all federal civilian agencies to review their networks for indicators of compromise and disconnect or power down SolarWinds Orion products immediately. Read more: http://cisa.gov/news/2020/12/13/cisa-issues-emergency-directive-mitigate-compromise-solarwinds-orion-network
10:03 PM · Dec 13, 2020
jpak
(41,780 posts)Yup
Response to Nevilledog (Original post)
jpak This message was self-deleted by its author.
mr_lebowski
(33,643 posts)ALL ACROSS their media infrastructure starting in the AM tomorrow, it will be a full court press ... can't move forward until this is ZOMG INVESTIGATED!!!1!!
Also they'll claim it 'proves' that 'CISA doesn't know what they're doing'.
As an aside, I don't think it's a coincidence this news dropped today.
Captain Zero
(8,905 posts)The National Telecommunications and Information Administration is an agency of the United States Department of Commerce that serves as the President's principal adviser on telecommunications policies ... Wikipedia
abqtommy
(14,118 posts)dalton99a
(94,115 posts)
Roisin Ni Fiachra
(2,574 posts)Brother Buzz
(39,899 posts)I'm just saying
DURHAM D
(33,054 posts)My Pet Orangutan
(12,598 posts)Root access to Federal networks - for months.
LearnedHand
(5,499 posts)Heres the CISA emergency directive to shut SolarWinds servers the fuck down: https://cyber.dhs.gov/ed/21-01/
honest.abe
(9,238 posts)The hackers are "highly sophisticated" and have been able to trick the Microsoft platform's authentication controls, according to a person familiar with the incident, who spoke on condition of anonymity because they were not allowed to speak to the press.
https://news.trust.org/item/20201213175137-8vsfr
Sgent
(5,858 posts)SolarWinds (the compromised vendor) is an enterprise management software for computers used by >400 of the Fortune 500, Treasury, Commerce, and all five military branches. Software that is incorporated into SW was compromised, and SW then signed it and the SW software was then installed on every single desktop, laptop and server in the organization. The SW software in managed environments will usually have admin rights, and would be able to access any information on the computers. The installed software also allowed the hackers to access the computers and upload / download additional software and data.
The only redeeming quality is this wasn't a burn it all down hack, it was an infiltrate and gather info -- meaning its probably not automated and the Russians would be limited due to manpower.
My Pet Orangutan
(12,598 posts)If it had been a burn it down hack, welcome to WWIV.
Hermit-The-Prog
(36,631 posts)My Pet Orangutan
(12,598 posts)Hermit-The-Prog
(36,631 posts)TomDaisy
(2,120 posts)progree
(12,977 posts)"that's something I cannot allow to happen"
Hermit-The-Prog
(36,631 posts)Dark n Stormy Knight
(10,484 posts)Trump's got dedicated bank account at Kickbacks R Us.
Best_man23
(5,268 posts)The SANS Institute's Internet Storm Center tracks ongoing virus and malware, and had the SolarWinds story on its main page. The ISC content is highly technical, but they do their best to make the information as easily digestible as possible. They have scheduled a webcast for 5 PM EST today.
https://isc.sans.edu/?_ga=2.220397464.1677938191.1607951488-1686481652.1594861345