Russian hackers also hacked Department of Homeland Security – Report

Russian hackers also hacked Department of Homeland Security – Report

The known list of targets hit by hackers is now five.


Hackread.com earlier reported on a massive espionage campaign launched by Russian government-sponsored hackers to spy on several high-profile US government institutions. As reported by the Washington Post, the New York Times, and Reuters Sunday, the attackers targeted the US Treasury and Commerce Department, National Telecommunications and Information Administration (NTIA), and some parts of the US Defense Department.


As per the latest reports, the list of victims of this spying campaign is longer than expected. Reportedly, part of the victims’ list is the US Department of Homeland Security, the National Institutes of Health, and the State Department.


Further investigation has revealed a highly sophisticated cyberespionage operation that could have been going on at least for nine months. It is alleged that Russia is behind this extensive campaign, the extent of damages of which are still unclear.

However, according to authorities, hackers exploited SolarWinds, a software company known for developing network-management software to spy on their targets. The company states that around 18,000 SolarWinds customers downloaded an infected software update through which the hackers could stay unnoticed while spying on agencies and businesses.


On Sunday, the US issued an emergency warning and ordered users to disconnect the compromised SolarWinds software immediately.


Interestingly, just like in the past when the Russian government categorically denied any involvement in cyberattacks on US institutions, this time around, too, Moscow denied any connections with the attackers.


The Cybersecurity and Infrastructure Security Agency (CISA) at DHS issued a rather unusual appeal on Monday. The department is asking people to share any knowledge of the breach with CISA at central@cisa ..

Support the originator by clicking the read the rest link below.