Security teams assess impact of suspected Russian cyberattack

“); //googletag.cmd.push(function () { googletag.display(‘rectangle-1’); }); // $(“#dvContent > p:eq(5)”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-2’); }); $(“#dvContent”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-3’); }); } else if (($(“#dvContent > p”).length / 3 >= 4 && $(“#dvContent > p”).length / 3 p:eq(3)”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-1’); }); //$(“#dvContent > p:eq(7)”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-2’); }); $(“#dvContent”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-3’); }); } else if (($(“#dvContent > p”).length / 3 >= 5 && $(“#dvContent > p”).length / 3 p:eq(4)”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-1’); }); //$(“#dvContent > p:eq(9)”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-2’); }); $(“#dvContent”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-3’); }); } else if (($(“#dvContent > p”).length / 3 p:eq(1)”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-1’); }); //$(“#dvContent > p:eq(3)”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-2’); }); $(“#dvContent”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-3’); }); } else{ $(“#dvContent > p:eq(6)”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-1’); }); //$(“#dvContent > p:eq(12)”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-2’); }); $(“#dvContent”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-3’); }); } } else{ $(“#dvContent”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-1’); }); //$(“#dvContent”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-2’); }); // $(“#dvContent”).after(“”); //googletag.cmd.push(function () { googletag.display(‘rectangle-3’); }); } } if (‘False’ == ‘True’){ $(‘.rsrch_img’).bind(‘contextmenu’, function(e) { return false; }); } if(‘912338468’ == ‘912333651’ || ‘912338468’ == ‘912335411’ || ‘912338468’ == ‘912336256’ || ‘912338468’ == ‘912336286’ || ‘912338468’ == ‘912336287’ || ‘912338468’ == ‘912336288’ || ‘912338468’ == ‘912336289’ || ‘912338468’ == ‘912336290’ || ‘912338468’ == ‘912336689’ || ‘912338468’ == ‘912336905’ || ‘912338468’ == ‘912337387’ || ‘912338468’ == ‘912337984’){ $(‘.homepagerightsection’).hide(); $(‘.homepageleftsection’).css({width:’100%’}); $(‘#dvContent img’).css(‘width’, ‘100%’); } $.get(‘/Home/GetReadersPollForArticlePage’, { articleID: ‘912338468’ }, function (response) { var options = “”; if (response != null && response.length > 0 && !response[0].IsAlreadyAnswered) { $(‘#PollQuestion’).text(response[0].Question); $.each(response, function (index, obj) { options = options + “

  • ” }); $(‘#hdnPollQuestionID’).val(response[0].PollQuestionID); $(‘#PollOption’).append(options); $(‘#dvReaderPoll’).show(); } }); }); function fnShowMore() { $(‘#lnkLess’).show(); $(‘#lnkMore’).hide(); $(‘.sharelist .tags’).show(); } function fnShowLess() { var firstLineTop = $(‘.sharelist .tags:first’).offset().top; $(‘#lnkLess’).hide(); $(‘#lnkMore’).show(); $(‘.sharelist .tags’).filter(function () { return $(this).offset().top > firstLineTop; }).hide(); $(‘.sharelist .tags:visible:last’).hide(); } function fnEmailToFriend(articleId) { var articleUrl = window.location.href; var tempUrl = ‘/Article/EmailToFriend?articleID=articleId&articleURL=articleUrl’; var Url = tempUrl.replace(“articleId”, articleId).replace(“articleUrl”, articleUrl); Url = Url.replace(“&”, “&”).replace(“&”, “&”).replace(“&”, “&”); $.fancybox({ href: Url, ‘padding’: 30, ‘height’: 480, ‘width’: 700, ‘autoSize’: false, ‘autoScale’: true, ‘closeBtn’: true, ‘showCloseButton’: true, ‘transitionIn’: ‘fade’, ‘transitionOut’: ‘fade’, ‘type’: ‘iframe’, ‘padding’: 10, hideOnOverlayClick: false, helpers: { overlay: { closeClick: false } } }); } function fnUpdateArticleViewCount() { $.ajax({ url: ‘/Article/UpdateViewCount’, datatype : ‘json’, data: { articleID: 912338468 }, success: function (data) { } }); } function fnShowNonUserArticleAccessMessage(){ $.ajax({ url: ‘/Article/ShowArticle’, cache: false, async: false, success: function (response) { if (response != null && response != undefined && response.viewCount != null && response.viewCount != undefined) { if (response.isUserLoggedIn == false && (response.viewCount == 2)) { //fnShowArticlePopup(‘912338468’); } } } }); } function fnShowArticlePopup() { $.fancybox({ ‘padding’: 5, ‘height’: 300, ‘width’: 700, type: ‘iframe’, href: ‘/Article/GuestUserArticleAccessPopup?articleID=912338468’, autoSize: false, closeBtn: true, transitionIn: ‘fade’, transitionOut: ‘fade’, centerOnScroll: true, overlayOpacity: 0.2, overlayColor: ‘#666’, helpers: { overlay: { closeClick: false } } }); $(‘.fancybox-wrap’).css({‘top’:’100px’, ‘bottom’:’auto’}); } $(“.fancybox”).fancybox({ openEffect: ‘elastic’, closeEffect: ‘elastic’, prevEffect: ‘fade’, nextEffect: ‘fade’, fitToView: false, // images won’t be scaled to fit to browser’s height maxWidth: “90%”, // images won’t exceed the browser’s width helpers: { overlay: { locked: false } }, beforeShow: function () { if (‘False’ == ‘True’){ /* Disable right click */ $.fancybox.wrap.bind(“contextmenu”, function (e) { return false; }); } } }); function fnSubmittRegistrationPopup(){ var isValid = true; if($(‘#txtFirstName’).val().trim() == “”) { isValid = false; $(‘#txtFirstName’).css(‘border-color’, ‘red’); } else if ($(‘#txtLastName’).val().trim() == “”){ isValid = false; $(‘#txtLastName’).css(‘border-color’, ‘red’); } else if ($(‘#txtEmail’).val().trim() == “”){ isValid = false; $(‘#txtEmail’).css(‘border-color’, ‘red’); } else if ($(‘#txtCompanyName’).val().trim() == “”){ isValid = false; $(‘#txtCompanyName’).css(‘border-color’, ‘red’); } else if ($(‘#ddlJobFunction’).val().trim() == ‘0’) { isValid = false; $(‘#lblJobFunctionRequired’).show(); } else if ($(“#ddlBusinessIndustry”).val().trim() == ‘0’) { isValid = false; $(‘#lblBusinessIndustryRequired’).show(); } if ($(‘#txtEmail’).val().trim() != “”) { var EmailRex = /^(([^()[\]\\.,;:\s@”]+(\.[^()[\]\\.,;:\s@”]+)*)|(“.+”))@((\[[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}])|(([a-zA-Z\-0-9]+\.)+[a-zA-Z]{2,}))$/; if (!EmailRex.test($(‘#txtEmail’).val())) { isValid = false; $(‘#lbInvalidEmail’).show(); } else { $(‘#lbInvalidEmail’).hide(); } } if (isValid){ $.post( ‘/Article/RegistrationPopup’, { firstName: $(‘#txtFirstName’).val().trim(), lastName: $(‘#txtLastName’).val().trim(), email: $(‘#txtEmail’).val().trim(), companyName: $(‘#txtCompanyName’).val().trim(), jobFunction: $(‘#ddlJobFunction’).val().trim(), businessIndustry: $(“#ddlBusinessIndustry”).val().trim() }, function(response){ if (response){ $(‘#dvRegPopup’).hide(); } } ); } } function fnCloseRegPopup(){ $.post(‘/Article/UpdatePopupCloseCount’, function () { $(‘#dvRegPopup’).hide(); }); } function fnAnswerReaderPoll() { if ($(‘input[name=rdoPollOptions]:checked’).length > 0) { $(‘#btnPollAnser’).attr(“onclick”, “”).unbind(“click”); $(‘#lblPollRequired’).hide(); $.post(‘/Home/AnswerReaderPoll’, { questionID: $(‘#hdnPollQuestionID’).val(), optionID: $(‘input[name=rdoPollOptions]:checked’).val(), answer: $(‘input[name=rdoPollOptions]:checked’).attr(‘answer’), page: ‘article’, articleID : ‘912338468’ }, function (response) { if (response.status) { debugger; //$(‘#PollQuestion’).hide(); $(‘#PollOption’).hide(); $(‘#btnPollAnser’).hide(); //$(‘#lblPollSuccessMessage’).show(); var html = “

      “; $.each(response.pollResult, function (index, obj) { html = html + “

    • ” + obj.OptionText + ” ” + “
    • “; }); html = html + ‘

    ‘; $(‘#dvPollPercentage’).append(html); $(‘#dvPollPercentage’).show(); } }); } else{ $(‘#lblPollRequired’).show(); } }

    Reprints

    SolarWinds

    (Reuters) — Global security teams moved on Monday to contain the fallout of a widespread cyberattack by suspected Russian hackers, who have been able to spy on the customers of U.S. information technology company SolarWinds unnoticed for more than eight months.

    The U.S. Department of Homeland Security issued an emergency warning on Sunday, ordering users to disconnect and disable SolarWinds software, which it said had been compromised by “malicious actors.”

    The U.S. warning came after Reuters reported that suspected Russian hackers had used hijacked software updates to break into multiple U.S. government agencies, including the Treasury and Commerce departments.

    Russia denied having any connection to the attacks.

    The potential scale of the compromise is enormous. SolarWinds boasts 300,000 customers, including the majority of U.S. Fortune 500 companies, and some of the most sensitive agencies in the U.S. government — including the Pentagon, the National Security Agency, and the White House.

    Two people familiar with the investigation told Reuters that any organization running an updated version of the company’s Orion network management software would have had a “backdoor” installed in their computer systems by the attackers.

    “After that, it’s just a question of whether the attackers decide to exploit that access further,” said one of the sources.

    SolarWinds said Monday that fewer than 18,000 of its customers had downloaded the compromised software update.

    In a regulatory disclosure Monday, the company said it believed the attack was the work of an “outside nation state” that inserted malicious code into updates of its Orion network management software issued between March and June this year.

    SolarWinds said it was not aware of vulnerabilities in any of its other products and it was now investigating with help from U.S. law enforcement and outside cybersecurity experts.

    Initial indications suggest the hackers were discriminating about who they chose to break into, according to two people familiar with the wave of corporate cybersecurity investigations being launched Monday morning.

    One executive said his company was hunting for SolarWinds-related compromises but had found “surprisingly little.”

    “We are seeing some things light up, but not what I would have thought was the market penetration of SolarWinds,” he said.

    Another person familiar with a second company’s investigation into the hack said that the hackers appeared mission-focused.

    “What we see is far fewer than all the possibilities,” he said. “They are using this like a scalpel.”

    SolarWinds has declined to put a figure on the number of customers affected by the breach, but said the attack appeared to be “narrow, extremely targeted, and manually executed.”

    Investigators around the world are now scrambling to find out who was hit.

    FireEye, a prominent cybersecurity company that was breached in connection with the incident, said in a blog post that other targets included “government, consulting, technology, telecom and extractive entities in North America, Europe, Asia and the Middle East.”

    Microsoft said in a blog post that it had first seen malicious copies of the SolarWinds software deployed by the hackers last March.

    In Britain, where publicly available SolarWinds sales documents show multiple government departments use the company’s software, a spokesman for Prime Minister Boris Johnson said investigations were ongoing.

    “The National Cyber Security Centre is working to assess any U.K. impact, but we’re not aware of any U.K.-related impact at this time,” the spokesman told reporters.

    Kremlin spokesman Dmitry Peskov said the allegations reported by Reuters and other media outlets were false.

    “If there have been attacks for many months, and the Americans could not do anything about it, it is probably not worth immediately groundlessly blaming the Russians,” he said. “We didn’t have anything to do with it.”