Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
SolarWinds hackers stole data on US sanctions policy, intelligence probes (reuters.com)
71 points by throwoutway on Oct 7, 2021 | hide | past | favorite | 11 comments


So I guess if I were a non-Russian actor wanting to pin this on Russia I could just search for information that a Russian actor would look for to pin it on them? Equally applies if I wanted to pin this on China, Iran, and so forth? Isn’t this too simplistic or perhaps it just serves domestic political interests?


Yes, and to be more subtle also see e.g. UMBRAGE in Vault7 [1]. CIA has impersonated Kaspersky Labs, and other agencies/countries do the same.

[1] https://wikileaks.org/ciav7p1/


Probably too simplistic in a world where western governments watch the internal CCTV security cameras of Russian/Chinese state hacking offices:

https://www.washingtonpost.com/news/worldviews/wp/2018/01/26...


>The country’s analysts were reportedly also able to track the location of the hackers' offices down to a university building next Moscow’s Red Square.

When I lived in Moscow my location was often misidentified as next to Red Square on various sites that tried to guess my location by IP or whatever else they use. I hope the analysts didn't use same tools.


I would assume at the point they had CCTV camera feeds they would be able to confirm the precise building by having agents watch people go in/out and comparing clothes of people on the camera vs in real life. But who knows what actually happened.


One of many methods is to look at the code page used if it is a text document or something similar. I guess if you wanted to there is nothing stopping you from making a document look like it came from a foreign country based on the document encoding. Then you have a ton of other metadata on files now that would have to match. Not exactly impossible.


Or if I'm the US and want to use this hack for political gains, I would announce that certain information was targeted when in reality they just dumped everything. Why would you use the limited time you may have access to comb through data when you can just grab everything?


> “If I’m a threat actor in an environment, I’ve got a clear set of objectives. First, I want to get valuable intelligence on government decision-making. Sanctions policy makes a ton of sense,” Krebs said.

Sanctions policy is public, isn't it?

> The second thing is to learn how the target responds to attacks, or "counter-incident response," he said: "I want to know what they know about me so I can improve my tradecraft and avoid detection.”

Sounds like the quoted interviewee is looking in a mirror.


Curious, has any data come out about how hackers were initially able to breach SolarWinds build systems? The company kept trying to call this "an incredibly sophisticated attacker", and, to be sure, the payload definitely was, but despite following this pretty intensely I never saw more info about how the breach occurred in the first place.


https://news.ycombinator.com/item?id=26284782

According to that, they blamed it on someone losing a password.


It would be an overly plain and simplistic story even for Soviet Pravda newspaper of the most intense Soviet propaganda times.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: