AGL 37.98 Decreased By ▼ -0.04 (-0.11%)
AIRLINK 211.99 Increased By ▲ 14.63 (7.41%)
BOP 9.73 Increased By ▲ 0.19 (1.99%)
CNERGY 6.39 Increased By ▲ 0.48 (8.12%)
DCL 9.20 Increased By ▲ 0.38 (4.31%)
DFML 37.70 Increased By ▲ 1.96 (5.48%)
DGKC 99.10 Increased By ▲ 2.24 (2.31%)
FCCL 35.90 Increased By ▲ 0.65 (1.84%)
FFBL 88.94 Increased By ▲ 6.64 (8.07%)
FFL 14.29 Increased By ▲ 1.12 (8.5%)
HUBC 130.98 Increased By ▲ 3.43 (2.69%)
HUMNL 13.75 Increased By ▲ 0.25 (1.85%)
KEL 5.53 Increased By ▲ 0.21 (3.95%)
KOSM 7.20 Increased By ▲ 0.20 (2.86%)
MLCF 45.59 Increased By ▲ 0.89 (1.99%)
NBP 61.75 Increased By ▲ 0.33 (0.54%)
OGDC 222.50 Increased By ▲ 7.83 (3.65%)
PAEL 41.07 Increased By ▲ 2.28 (5.88%)
PIBTL 8.47 Increased By ▲ 0.22 (2.67%)
PPL 200.50 Increased By ▲ 7.42 (3.84%)
PRL 39.81 Increased By ▲ 1.15 (2.97%)
PTC 27.65 Increased By ▲ 1.85 (7.17%)
SEARL 108.60 Increased By ▲ 5.00 (4.83%)
TELE 8.59 Increased By ▲ 0.29 (3.49%)
TOMCL 36.00 Increased By ▲ 1.00 (2.86%)
TPLP 13.73 Increased By ▲ 0.43 (3.23%)
TREET 24.38 Increased By ▲ 2.22 (10.02%)
TRG 61.15 Increased By ▲ 5.56 (10%)
UNITY 34.20 Increased By ▲ 1.23 (3.73%)
WTL 1.68 Increased By ▲ 0.08 (5%)
BR100 12,099 Increased By 372.1 (3.17%)
BR30 37,599 Increased By 1222.5 (3.36%)
KSE100 113,090 Increased By 3577 (3.27%)
KSE30 35,732 Increased By 1218.2 (3.53%)

WASHINGTON: The stunning SolarWinds hack that cybersecurity experts blame on Russia likely took a massive, disciplined effort by more than 1,000 software engineers, Microsoft President Brad Smith said Tuesday.

Smith told a hearing of the Senate Intelligence Committee that no other body but Russian intelligence has the ability to muster such an effort, which he branded "reckless" in the breadth of its threat to the globe.

Microsoft, one of more than 100 companies attacked and 18,000 left vulnerable by the hack, analyzed the work it took to insert malware into widely used security software created by SolarWinds.

"We asked ourselves how many engineers do we believe had worked on this collective effort. And the answer we came to was... at least 1,000, very skilled, capable engineers.

"We haven't seen this kind of sophistication matched with this kind of scale," he said.

Smith compared previous hacks from Russian- and other government-backed groups to a burglar breaking into a single apartment.

The SolarWinds incident was different, he said: it was like a burglar who "manages to turn off the alarm system for every home and every building in the entire city."

"Everybody's safety is put at risk. And that is what we're grappling with here," he said.

The hack was discovered by computer security firm FireEye in December after it had sat on computers around the world.

Among US government agencies penetrated were the National Security Agency, the State Department, Commerce Department and the Treasury.

The Washington Post reported Tuesday that the Biden administration was studying options to Punish Moscow for the hack and for other "malign" activity.

Last week Anne Neuberger, the senior White House cybersecurity advisor, said her team was looking "holistically" at retaliation.

"This isn't the only case of malicious cyber activity of likely Russian origin, either for us or for our allies and partners," she said.

In the Senate hearing, FireEye chief executive Kevin Mandia described the hack as the culmination of a "multi-decade" effort by the attackers.

He said it took thousands of hours for his staff to discover the bug, and only after tearing apart and decompiling thousands of files on a SolarWinds server.

"This was not the first place you look, this was the last place you look for an insertion," he said.

Sudhakar Ramakrishna, the chief executive of SolarWinds, said that after months the company still has not found how the hackers managed to implant malware in the middle of the software supply chain -- at the point when completed code is being tailored to downstream users' configurations.

"We understand the gravity of the situation," he said.

While currently companies can voluntarily report to the cybersecurity officials of the Department of Homeland Security, some suggested a legal requirement that they do so, to catch future threats early.

"It seems to me that there should be an obligation of some sort on the part of a victim of a cyber attack like this to share what they know, what they've learned, with the appropriate authorities," said Senator John Cornyn.

"There's got to be a way for folks who are responding to breaches to share data quickly to protect the nation, protect industries," said Mandia.

Comments

Comments are closed.