Connect with us

Uncategorized

A Second SolarWinds Hack Deepens Third-Party Software Fears – WIRED

https://www.wired.com/story/solarwinds-hack-china-usda/

It’s been more than two months since revelations that alleged Russia-backed hackers broke into the IT management firm SolarWinds and used that access to launch a massive software supply chain attack. It now appears that Russia wasn’t alone; Reuters reports that suspected Chinese hackers independently exploited a different flaw in SolarWinds products last year at around the same time, apparently hitting the US Department of Agriculture’s National Finance Center.

SolarWinds patched the vulnerability in December that the alleged China hackers exploited. But the revelation underscores the seemingly impossible task that organizations face in dealing with not only their own security issues but also potential exposure from the countless third-party companies they partner with for services that range from IT management to data storage to office chat. In today’s interconnected landscape, you’re only as strong as your weakest vendor.

“It’s not realistic to not depend on any third parties,” says Katie Nickels, director of intelligence at the security firm Red Canary. “It’s just not realistic the way any network is run. But what we saw for the first week or two, even after the initial SolarWinds revelations, was some organizations just trying to figure out whether they even use SolarWinds products. So I think the shift has to be to knowing those dependencies and understanding how they should and shouldn’t be interacting.”

SolarWinds emphasizes that, unlike the Russian hackers, who used their access to SolarWinds to infiltrate targets, the Chinese hackers exploited the vulnerability only after already breaking into a network by some other means. They then used the flaw to bore deeper. “We are aware of one instance of this happening, and there is no reason to believe these attackers were inside the SolarWinds environment at any time,” the company said in a statement. “This is separate from the broad and sophisticated attack that targeted multiple software companies as vectors.” The USDA did not return a request for comment.

The ubiquity of software like Microsoft Windows or, until recently, Adobe Flash makes them popular targets for a wide variety of hackers. As a company that’s more than two decades old and has a big customer base—including a large number of government contracts in the United States and abroad—SolarWinds makes perfect sense for hackers to prod. But SolarWinds is also just one of a multitude of enterprise tools and IT management services that companies need to run constantly and simultaneously. Each represents a potential inroad for attackers.

“I’ve got hundreds of different vendors we use, from Microsoft to Box, Zoom, Slack, and so on. It only takes one,” says Marcin Kleczynski, CEO of the antivirus maker Malwarebytes, which disclosed in January that it had been a victim of the suspected Russian hacking spree. “It’s a catch-22. Rely on one vendor and you’re screwed if they get hit. Rely on multiple and all it takes is one. Rely on the big brands and deal with the consequences that they’re the most targeted. Rely on the small brands and deal with the consequences that they’re not yet investing in security.”

Malwarebytes is illustrative of that tension in another key way; the Russian hackers who compromised it got in through a method other than SolarWinds. Brandon Wales, acting director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, told The Wall Street Journal in January that the hackers “gained access to their targets in a variety of ways.” You can defend your treasure by hiding it in a castle on a mountain surrounded by a big wall and an alligator-filled moat, or you can scatter it around the world in strong but inconspicuous lockboxes. Both approaches invite their own set of risks.