'Powerful tradecraft': how foreign cyber-spies compromised America | The Business Standard
Skip to main content
  • Epaper
  • Economy
    • Aviation
    • Banking
    • Bazaar
    • Budget
    • Industry
    • NBR
    • RMG
    • Corporates
  • Stocks
  • Analysis
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
The Business Standard

Thursday
May 15, 2025

Sign In
Subscribe
  • Epaper
  • Economy
    • Aviation
    • Banking
    • Bazaar
    • Budget
    • Industry
    • NBR
    • RMG
    • Corporates
  • Stocks
  • Analysis
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
THURSDAY, MAY 15, 2025
'Powerful tradecraft': how foreign cyber-spies compromised America

Tech

Reuters
20 December, 2020, 09:35 am
Last modified: 20 December, 2020, 11:08 am

Related News

  • Man arrested for molesting American woman in Cox's Bazar confesses before court
  • Neoliberalism and Pax Americana: Beginning of the end?
  • Indian sailors discovered America, not Christopher Columbus, claims Indian minister
  • 10 billion passwords exposed in largest leak ever: Report
  • Civil War returns, but only on screens

'Powerful tradecraft': how foreign cyber-spies compromised America

A little over three weeks after that dinner, the hackers began a sweeping intelligence operation that has penetrated the heart of America’s government and numerous corporations and other institutions around the world

Reuters
20 December, 2020, 09:35 am
Last modified: 20 December, 2020, 11:08 am
The SolarWinds headquarters are seen in Austin, Texas, US, 18 December, 2020/ Reuters
The SolarWinds headquarters are seen in Austin, Texas, US, 18 December, 2020/ Reuters

Speaking at a private dinner for tech security executives at the St Regis Hotel in San Francisco in late February, America's cyber defense chief boasted how well his organisations protect the country from spies.

US teams were "understanding the adversary better than the adversary understands themselves," said General Paul Nakasone, boss of the National Security Agency (NSA) and US Cyber Command, according to a Reuters reporter present at the 26 February dinner. His speech has not been previously reported.

Yet even as he spoke, hackers were embedding malicious code into the network of a Texas software company called SolarWinds Corp, according to a timeline published by Microsoft and more than a dozen government and corporate cyber researchers.

The Business Standard Google News Keep updated, follow The Business Standard's Google news channel

A little over three weeks after that dinner, the hackers began a sweeping intelligence operation that has penetrated the heart of America's government and numerous corporations and other institutions around the world.

The results of that operation came to light on December 13, when Reuters reported that suspected Russian hackers had gained access to US Treasury and Commerce Department emails. Since then, officials and researchers say they believe at least half-a-dozen US government agencies have been infiltrated and thousands of companies infected with malware in what appears to be one of the biggest such hacks ever uncovered.

Secretary of State Mike Pompeo said on Friday Russia was behind the attack, calling it "a grave risk" to the United States. Russia has denied involvement.

Revelations of the attack come at a vulnerable time as the US government grapples with a contentious presidential transition and a spiraling public health crisis. And it reflects a new level of sophistication and scale, hitting numerous federal agencies and threatening to inflict far more damage to public trust in America's cybersecurity infrastructure than previous acts of digital espionage.

Much remains unknown -- including the motive or ultimate target.

Hackers' broad attack sets cyber experts worldwide scrambling to defend networks

Seven government officials have told Reuters they are largely in the dark about what information might have been stolen or manipulated -- or what it will take to undo the damage. The last known breach of US federal systems by suspected Russian intelligence -- when hackers gained access to the unclassified email systems at the White House, the State Department and the Joint Chiefs of Staff in 2014 and 2015 -- took years to unwind.

US President Donald Trump on Saturday downplayed the hack and Russia's involvement, maintaining it was "under control" and that China could be responsible. He accused the "Fake News Media" of exaggerating its extent.

The NSC, however, acknowledged that a "significant cyber incident" had taken place. "There will be an appropriate response to those actors behind this conduct," said NSC spokesman John Ullyot. He did not respond to a question on whether Trump had evidence of Chinese involvement in the attack.

Several government agencies, including the NSA and the Department of Homeland Security, have issued technical advisories on the situation. Nakasone and the NSA declined to comment for this story.

Lawmakers from both parties said they were struggling to get answers from the departments they oversee, including Treasury. One senate staffer said his boss knew more about the attack from the media than the government.

'Powerful Tradecraft'

The hack first came into view last week, when US cybersecurity firm FireEye Inc disclosed that it had itself been a victim of the very kind of cyberattack that clients pay it to prevent.

Publicly, the incident initially seemed mostly like an embarrassment for FireEye. But hacks of security firms are especially dangerous because their tools often reach deeply into the computer systems of their clients.

Days before the hack was revealed, FireEye researchers knew something troubling was afoot and contacted Microsoft Corp and the Federal Bureau of Investigation, three people involved in those communications told Reuters. Microsoft and the FBI declined to comment.

Their message: FireEye has been hit by an extraordinarily sophisticated cyber-espionage campaign carried out by a nation-state, and its own problems were likely just the tip of the iceberg.

About half a dozen researchers from FireEye and Microsoft, set about investigating, said two sources familiar with the response effort. At the root of the problem, they found, was something that strikes dread in cybersecurity professionals: so-called supply-chain compromises, which in this case involved using software updates to install malware that can spy on systems, exfiltrate information and potentially wreak other types of havoc.

In 2017, Russian operatives used the technique to knock out private and government computer systems across Ukraine, after hiding a piece of malicious code in a widely used accountancy program that was then used to deploy a destructive virus known as NotPetya. Russia has denied that it was involved. The malware quickly infected computers in scores of other countries, crippling businesses and causing hundreds of millions of dollars of damage.

The latest US hack employed a similar technique: SolarWinds said its software updates had been compromised and used to surreptitiously install malicious code in nearly 18,000 customer systems. Its Orion network management software is used by hundreds of thousands of organizations.

Once downloaded, the program signaled back to its operators where it had landed. In some cases where access was especially valuable, the hackers used it to deploy more active malicious software to spread across its host.

In some of the attacks, the intruders combined the administrator privileges granted to SolarWinds with Microsoft's Azure cloud platform - which stores customers' data online - to forge authentication "tokens." Those gave them far longer and wider access to emails and documents than many organizations thought was possible.

Hackers could then steal documents through Microsoft's Office 365, the online version of its most popular business software, the NSA said on Thursday in an unusual technical public advisory. Also on Thursday, Microsoft announced it found malicious code in its systems.

A separate advisory issued by the US Cybersecurity and Infrastructure Security Agency on 17 December said that the SolarWinds software was not the only vehicle being used in the attacks and that the same group had likely used other methods to implant malware.

"This is powerful tradecraft, and needs to be understood to defend important networks," Rob Joyce, a senior NSA cybersecurity adviser, said on Twitter.

It is unknown how or when SolarWinds was first compromised. According to researchers at Microsoft and other firms that have investigated the hack, intruders first began tampering with SolarWinds' code as early as October 2019, a few months before it was in a position to launch an attack.

"Hardening Our Networks"

Pressure is growing on the White House to act.

Republican Senator Marco Rubio said "America must retaliate, and not just with sanctions." Mitt Romney, also a Republican, likened the attack to repeatedly allowing Russian bombers to fly undetected over America. Senator Dick Durbin, a Democrat, has called it "virtually a declaration of war."

Democratic lawmakers said they had received little information from the Trump administration beyond what's in the media. "Their briefings were obtuse, sorely lacking in details and really seemed an attempt to provide us with the barest of minimum in information that they had to give us," Democratic Representative Debbie Wasserman Schultz told reporters after a classified briefing.

Ullyot, the National Security Council spokesman, declined to comment on the congressional briefings. The White House was "focused on investigating the circumstances surrounding this incident, and working with our interagency partners to mitigate the situation," he said in a statement to Reuters.

President-elect Joe Biden has warned that his administration would impose "substantial costs" on those responsible. House of Representatives Intelligence Committee Chairman Adam Schiff, also a Democrat, said Biden "must make hardening our networks – both public and private infrastructure – a major priority."

The attack puts a spotlight on those cyber defenses, reviving criticism that the US intelligence agencies are more interested in offensive cyber operations than protecting government infrastructure.

"The attacker has the advantage over defenders. Decades worth of money, patents and effort have done nothing to change that," said Jason Healey, a cyber conflict researcher at Columbia University and former White House security official in the George W. Bush administration.

"Now we learn with the SolarWinds hack that if anything, the defenders are falling farther behind. The overriding priority must be to flip this, so that defenders have the easier time."

Top News / World+Biz

America / hack / cyber spies

Comments

While most comments will be posted if they are on-topic and not abusive, moderation decisions are subjective. Published comments are readers’ own views and The Business Standard does not endorse any of the readers’ comments.

Top Stories

  • Jagannath University students and teachers protest at the Kakrail Mosque intersection in Dhaka on 15 May 2025. Photo: Mehedi Hasan/TBS
    DMP bans rallies, demos at Kakrail as JnU students vow to continue sit-in until demands met
  • Students of Jagannath University protest at Kakrail, Dhaka, on 15 May 2025. Photo: Sadiqe Al Ashfaqe
    Teachers announce JnU shutdown until demands met
  • A screenshot of Google Maps showing Dhaka's traffic situation at 7:14pm on 15 May
    Traffic congestion chokes parts of Dhaka as protesters block road during rush hours

MOST VIEWED

  • Chief Adviser Muhammad Yunus speaking at Chittagong Port on 14 May 2025. Photo: CA Press Wing
    Ctg port must emerge as best with int'l standard facilities for economic growth: CA
  • Shahriar Alam Shammo. Photo: Collected
    3 arrested over JCD leader Shammo killing
  • Up to 20% dearness allowance for govt employees likely from July
    Up to 20% dearness allowance for govt employees likely from July
  • Chief Adviser Muhammad Yunus on a visit to Chattogram on 14 May 2025. Photo: TBS
    CA Yunus begins Chattogram tour with packed engagements
  • Infograph: TBS
    Govt plans to align official land price with market rates
  • Infographics: TBS
    $3.5b loan unlocked with shift to market-based exchange rate

Related News

  • Man arrested for molesting American woman in Cox's Bazar confesses before court
  • Neoliberalism and Pax Americana: Beginning of the end?
  • Indian sailors discovered America, not Christopher Columbus, claims Indian minister
  • 10 billion passwords exposed in largest leak ever: Report
  • Civil War returns, but only on screens

Features

An old-fashioned telescope, also from an old ship, is displayed at a store at Chattogram’s Madam Bibir Hat area. PHOTO: TBS

NO SCRAP LEFT BEHIND: How Bhatiari’s ship graveyard still furnishes homes across Bangladesh

22h | Panorama
Sketch: TBS

‘National University is now focusing on technical and language education’

1d | Pursuit
Illustration: TBS

How to crack the code to get into multinational companies

1d | Pursuit
More than 100 trucks of pineapples are sold from Madhupur every day, each carrying 3,000 to 10,000 pineapples. Photo: TBS

The bitter aftertaste of Madhupur's sweet pineapples

1d | Panorama

More Videos from TBS

Capable leadership is essential—without it, NBR’s division will fail

Capable leadership is essential—without it, NBR’s division will fail

2h | TBS Economy
Russia-Ukraine talks in Istanbul: Russian President Putin not on the list

Russia-Ukraine talks in Istanbul: Russian President Putin not on the list

2h | TBS World
Photo Exhibition Showcasing Indigenous Heritage Underway in Bandarban

Photo Exhibition Showcasing Indigenous Heritage Underway in Bandarban

2h | TBS Today
How can tax reforms help reduce income?

How can tax reforms help reduce income?

2h | TBS Programs
EMAIL US
contact@tbsnews.net
FOLLOW US
WHATSAPP
+880 1847416158
The Business Standard
  • About Us
  • Contact us
  • Sitemap
  • Advertisement
  • Privacy Policy
  • Comment Policy
Copyright © 2025
The Business Standard All rights reserved
Technical Partner: RSI Lab

Contact Us

The Business Standard

Main Office -4/A, Eskaton Garden, Dhaka- 1000

Phone: +8801847 416158 - 59

Send Opinion articles to - oped.tbs@gmail.com

For advertisement- sales@tbsnews.net