The suspected Russian hackers behind a cyberattack against U.S. individuals, entities and government agencies were able to access servers by guessing passwords, investigators said.
The cyberattack, originally traced back to software made by SolarWinds, is now believed to extend much farther than originally thought, according to investigators, The Wall Street Journal reported. Hackers are now believed to have accessed Microsoft cloud infrastructure and investigators estimate that 30% of the victims targeted in the attack had no connection to SolarWinds.
“This adversary has been creative,” Cybersecurity and Infrastructure Security Agency Acting Director Brandon Wales told the WSJ. “It is absolutely correct that this campaign should not be thought of as the SolarWinds campaign.” (RELATED: REPORT: DHS Officials Were Also Monitored In Suspected Russian Cyber Espionage Operation)
The cyber intruders were able to access online accounts, in part, by guessing users’ passwords, according to the WSJ. They were also able to exploit bugs in software and issues in Microsoft’s cloud-based software, the world’s largest business software provider.
Cybersecurity firm Malwarebytes Inc. recently said many of its own Microsoft cloud accounts were compromised in the cyberattack, the WSJ reported.
U.S. authorities have blamed the Russian government for the months-long attack, which reportedly began in July and was detected by the cybersecurity firm FireEye in December, the WSJ reported. (RELATED: Feds Say Latest US Government Hack ‘Poses A Grave Risk’ To National Security. How Might They Respond?)
The massive cyberattack was conducted using servers and computers within the U.S. and often from within the same town or city as the victims of the attack, according to FireEye. Because the attack came from domestic servers, the perpetrators were able to evade the National Security Agency’s authority, which does not extend to domestic private-sector networks.
It is expected that Russian actors accessed about 250 U.S. networks, including Fortune 500 companies and several government agencies such as the Department of Homeland Security, the Treasury Department and the National Nuclear Security Administration, according to The New York Times.
“We still don’t know what Russia’s strategic objectives were,” Suzanne Spaulding, a former DHS cybersecurity official, told the NYT.
“But we should be concerned that part of this may go beyond reconnaissance,” she continued. “Their goal may be to put themselves in a position to have leverage over the new administration.”
Content created by The Daily Caller News Foundation is available without charge to any eligible news publisher that can provide a large audience. For licensing opportunities of our original content, please contact firstname.lastname@example.org.