foreignpolicy.com Open in urlscan Pro
192.0.66.136  Public Scan

URL: https://foreignpolicy.com/2021/05/24/cybersecurity-cyberattack-russia-hackers-cloud-sunburst-microsoft-office-365-data-leak/
Submission: On November 08 via api from CH — Scanned from DE

Form analysis 2 forms found in the DOM

GET /

<form role="search" method="get" id="searchform-mobile" class="searchform" action="/">
  <label class="hide" for="searchfield-mobile">Search</label>
  <input class="search" type="search" name="s" id="searchfield-mobile" aria-label="Search">
  <input type="submit" value="search-submit" style="display:none" aria-label="Submit">
</form>

GET /

<form role="search" method="get" id="searchform-desktop" class="searchform" action="/">
  <label class="hide" for="searchfield-desktop">Search</label>
  <input class="search" type="search" name="s" id="searchfield-desktop" aria-label="Search">
  <input type="submit" value="search-submit" style="display:none" aria-label="Submit">
</form>

Text Content

Skip to main content

Foreign Policy Magazine Foreign Policy Magazine
Account Management, Search, and Primary Navigation
 * Sign In
 * Give a Gift Give a Gift
 * Subscribe Subscribe Upgrade Upgrade

 * Latest
 * News
 * Analysis
 * Podcasts
 * The Magazine
 * Newsletters
 * FP Live
 * Events
 * FP Analytics

Search Icon
Search


LATEST


HOW TO SLOW CLIMATE CHANGE WHILE FIGHTING POVERTY

Falling aid budgets and ballooning debt in the developing world are impediments
to climate action. Green aid projects can bring poorer countries on board.

Argument | Rabah Arezki


THE UNITED STATES’ EASIEST CLIMATE WIN IS IN LATIN AMERICA

Washington has the money for Latin America's energy transition—if it weren’t for
the bureaucratic fine print.

Analysis | Benjamin N. Gedan


CONSERVATIVE U.S. STATECRAFT FOR THE 21ST CENTURY

Republicans may disagree on policy, but their principles will help the United
States navigate a fragmenting world.

Shadow Government | Nadia Schadlow


CHINA’S ZERO-COVID POLICIES ARE STIRRING XENOPHOBIA

Anti-foreign language has become part of disease control.

Argument | Amanda Florian
See All Stories
 * FP Events
 * FP Studios
 * FP Analytics
 * FP PeaceGames

 * Subscription Services
 * Group Subscriptions
 * Reprint Permissions
 * Writer’s Guidelines

 * FP Guides – Graduate Education
 * FP For Education
 * FP Archive
 * Buy Back Issues

 * Work At FP
 * Meet the Staff
 * Advertising/Partnerships
 * Country Reports

Account Management and Search
 * Sign In
 * Give a Gift Give a Gift
 * Subscribe Subscribe Upgrade Upgrade

Search Icon
Search
Toggle display of website navigation

Argument: Russia’s Hacking Success Shows How Vulnerable the Cloud Is Russia’s
Hacking Success Shows How Vulnera...

SHARE:



ARGUMENT

An expert's point of view on a current event.


RUSSIA’S HACKING SUCCESS SHOWS HOW VULNERABLE THE CLOUD IS


THE CLOUD IS EVERYWHERE. IT’S CRITICAL TO COMPUTING. AND IT’S UNDER ATTACK.

By Bruce Schneier, a fellow and lecturer at the Harvard Kennedy School, and Trey
Herr, the director of the Cyber Statecraft Initiative at the Atlantic Council’s
Scowcroft Center for Strategy and Security.
U.S. Deputy Attorney General Jeffrey A. Rosen at a press conference concerning a
hacking campaign tied to the Chinese government at the U.S. Department of
Justice in Washington on Sept. 16, 2020.
U.S. Deputy Attorney General Jeffrey A. Rosen at a press conference concerning a
hacking campaign tied to the Chinese government at the U.S. Department of
Justice in Washington on Sept. 16, 2020. TASOS KATOPODIS/POOL/AFP via Getty
Images
May 24, 2021, 10:00 AM

Russia’s Sunburst cyberespionage campaign, discovered late last year, impacted
more than 100 large companies and U.S. federal agencies, including the Treasury,
Energy, Justice, and Homeland Security departments. A crucial part of the
Russians’ success was their ability to move through these organizations by
compromising cloud and local network identity systems to then access cloud
accounts and pilfer emails and files.

Hackers said by the U.S. government to have been working for the Kremlin
targeted a widely used Microsoft cloud service that synchronizes user
identities. The hackers stole security certificates to create their own
identities, which allowed them to bypass safeguards such as multifactor
authentication and gain access to Office 365 accounts, impacting thousands of
users at the affected companies and government agencies.

It wasn’t the first time cloud services were the focus of a cyberattack, and it
certainly won’t be the last. Cloud weaknesses were also critical in a 2019
breach at Capital One. There, an Amazon Web Services cloud vulnerability,
compounded by Capital One’s own struggle to properly configure a complex cloud
service, led to the disclosure of tens of millions of customer records,
including credit card applications, Social Security numbers, and bank account
information.

Russia’s Sunburst cyberespionage campaign, discovered late last year, impacted
more than 100 large companies and U.S. federal agencies, including the Treasury,
Energy, Justice, and Homeland Security departments. A crucial part of the
Russians’ success was their ability to move through these organizations by
compromising cloud and local network identity systems to then access cloud
accounts and pilfer emails and files.

Hackers said by the U.S. government to have been working for the Kremlin
targeted a widely used Microsoft cloud service that synchronizes user
identities. The hackers stole security certificates to create their own
identities, which allowed them to bypass safeguards such as multifactor
authentication and gain access to Office 365 accounts, impacting thousands of
users at the affected companies and government agencies.

It wasn’t the first time cloud services were the focus of a cyberattack, and it
certainly won’t be the last. Cloud weaknesses were also critical in a 2019
breach at Capital One. There, an Amazon Web Services cloud vulnerability,
compounded by Capital One’s own struggle to properly configure a complex cloud
service, led to the disclosure of tens of millions of customer records,
including credit card applications, Social Security numbers, and bank account
information.

This trend of attacks on cloud services by criminals, hackers, and nation states
is growing as cloud computing takes over worldwide as the default model for
information technologies. Leaked data is bad enough, but disruption to the
cloud, even an outage at a single provider, could quickly cost the global
economy billions of dollars a day.

Get the full experience.

CHOOSE YOUR PLAN

Cloud computing is an important source of risk both because it has quickly
supplanted traditional IT and because it concentrates ownership of design
choices at a very small number of companies. First, cloud is increasingly the
default mode of computing for organizations, meaning ever more users and
critical data from national intelligence and defense agencies ride on these
technologies. Second, cloud computing services, especially those supplied by the
world’s four largest providers—Amazon, Microsoft, Alibaba, and
Google—concentrate key security and technology design choices inside a small
number of organizations. The consequences of bad decisions or poorly made
trade-offs can quickly scale to hundreds of millions of users.



As long as a cloud provider isn’t losing customers by the droves, it is
incentivized to underinvest in security.

The cloud is everywhere. Some cloud companies provide software as a service,
support your Netflix habit, or carry your Slack chats. Others provide computing
infrastructure like business databases and storage space. The largest cloud
companies provide both.

The cloud can be deployed in several different ways, each of which shift the
balance of responsibility for the security of this technology. But the cloud
provider plays an important role in every case. Choices the provider makes in
how these technologies are designed, built, and deployed influence the user’s
security—yet the user has very little influence over them. Then, if Google or
Amazon has a vulnerability in their servers—which you are unlikely to know about
and have no control over—you suffer the consequences.

The problem is one of economics. On the surface, it might seem that competition
between cloud companies gives them an incentive to invest in their users’
security. But several market failures get in the way of that ideal. First,
security is largely an externality for these cloud companies, because the losses
due to data breaches are largely borne by their users. As long as a cloud
provider isn’t losing customers by the droves—which generally doesn’t happen
after a security incident—it is incentivized to underinvest in security.
Additionally, data shows that investors don’t punish the cloud service companies
either: Stock price dips after a public security breach are both small and
temporary.

Second, public information about cloud security generally doesn’t share the
design trade-offs involved in building these cloud services or provide much
transparency about the resulting risks. While cloud companies have to publicly
disclose copious amounts of security design and operational information, it can
be impossible for consumers to understand which threats the cloud services are
taking into account, and how. This lack of understanding makes it hard to assess
a cloud service’s overall security. As a result, customers and users aren’t able
to differentiate between secure and insecure services, so they don’t base their
buying and use decisions on it.

Read More

Microsoft signage is seen in New York on March 13, 2020.


A ‘CRAZY HUGE’ HACK

Who was behind the largest-ever cyberattack on the United States—and how can the
next one be prevented?

Q&A | Jonathan Tepperman
This photograph taken on Sept. 18, 2019, shows the entrance and logo of the
French national cybersecurity agency, ANSSI, at ANSSI headquarters in Paris.


THE WORLD NEEDS A CYBER-WHO TO COUNTER VIRUSES IN CYBERSPACE

A global body has helped poorer nations counter COVID-19, but less
technologically advanced countries need a similar institution to protect against
the coming plague of cyberattacks.

Argument | Yaron Rosen
A poster showing six wanted Russian military intelligence officers is displayed
at the U.S. Department of Justice in Washington on Oct. 19, 2020.


WHY THE LATEST CYBERATTACK WAS DIFFERENT

The epic SolarWinds hack affecting thousands of government agencies and
companies could mark the beginning of the end of the open internet.

Report | Robert Muggah

Third, cybersecurity is complex—and even more complex when the cloud is
involved. For a customer like a company or government agency, the security
dependencies of various cloud and on-premises network systems and services can
be subtle and hard to map out. This means that users can’t adequately assess the
security of cloud services or how they will interact with their own networks.
This is a classic “lemons market” in economics, and the result is that cloud
providers provide variable levels of security, as documented by Dan Geer, the
chief information security officer for In-Q-Tel, and Wade Baker, a professor at
Virginia Tech’s College of Business, when they looked at the prevalence of
severe security findings at the top 10 largest cloud providers. Yet most
consumers are none the wiser.

The result is a market failure where cloud service providers don’t compete to
provide the best security for their customers and users at the lowest cost.
Instead, cloud companies take the chance that they won’t get hacked, and past
experience tells them they can weather the storm if they do. This kind of
decision-making and priority-setting takes place at the executive level, of
course, and doesn’t reflect the dedication and technical skill of product
engineers and security specialists. The effect of this underinvestment is
pernicious, however, by piling on risk that’s largely hidden from users.
Widespread adoption of cloud computing carries that risk to an organization’s
network, to its customers and users, and, in turn, to the wider internet.

Not since the heights of the mainframe era has the world witnessed computing
systems of such complexity used by so many but designed and created by so few.



This aggregation of cybersecurity risk creates a national security challenge.
Policymakers can help address the challenge by setting clear expectations for
the security of cloud services—and for making decisions and design trade-offs
about that security transparent. The Biden administration, including newly
nominated National Cyber Director Chris Inglis, should lead an interagency
effort to work with cloud providers to review their threat models and evaluate
the security architecture of their various offerings. This effort to require
greater transparency from cloud providers and exert more scrutiny of their
security engineering efforts should be accompanied by a push to modernize
cybersecurity regulations for the cloud era.

The Federal Risk and Authorization Management Program (FedRAMP), which is the
principal U.S. government program for assessing the risk of cloud services and
authorizing them for use by government agencies, would be a prime vehicle for
these efforts. A recent executive order outlines several steps to make FedRAMP
faster and more responsive. But the program is still focused largely on the
security of individual services rather than the cloud vendors’ deeper
architectural choices and threat models. Congressional action should reinforce
and extend the executive order by adding new obligations for vendors to provide
transparency about design trade-offs, threat models, and resulting risks. These
changes could help transform FedRAMP into a more effective tool of security
governance even as it becomes faster and more efficient.

Cloud providers have become important national infrastructure. Not since the
heights of the mainframe era between the 1960s and early 1980s has the world
witnessed computing systems of such complexity used by so many but designed and
created by so few. The security of this infrastructure demands greater
transparency and public accountability—if only to match the consequences of its
failure.




Bruce Schneier is a fellow and lecturer at the Harvard Kennedy School. His
latest book is Click Here to Kill Everybody: Security and Survival in a
Hyper-connected World.

Trey Herr is the director of the Cyber Statecraft Initiative at the Atlantic
Council’s Scowcroft Center for Strategy and Security.

Tags: Cyber Security & Hacking, Russia

NEW EMAIL ALERTS FP subscribers can now receive alerts when new stories on these
topics and regions are published. Subscribe now | Sign in

NEW FOR SUBSCRIBERS: Want to read more on this topic or region? Click + to
receive email alerts when new stories are published on Russia Russia

 


✕


Advertisement

THE OBVIOUS CLIMATE STRATEGY NOBODY WILL TALK ABOUT



Latest


HOW TO SLOW CLIMATE CHANGE WHILE FIGHTING POVERTY

November 7, 2022, 4:26 PM


THE UNITED STATES’ EASIEST CLIMATE WIN IS IN LATIN AMERICA

November 7, 2022, 3:23 PM


WHAT COULD A REPUBLICAN FOREIGN POLICY LOOK LIKE?

November 7, 2022, 2:56 PM


CHINA’S ZERO-COVID POLICIES ARE STIRRING XENOPHOBIA

November 7, 2022, 2:25 PM


HOW UKRAINE FIGURES IN LAST-MINUTE MIDTERM PITCHES

November 7, 2022, 1:20 PM
See All Stories

Trending

 1. 1
    The Obvious Climate Strategy Nobody Will Talk About
 2. 2
    The Cult of Modi
 3. 3
    It’s Woman vs. Woman in Iran’s Protests
 4. 4
    6 Wrong Lessons for Taiwan From the War in Ukraine
 5. 5
    China’s Zero-COVID Policies Are Stirring Xenophobia





MORE FROM FOREIGN POLICY

A person in Taipei, Taiwan, holds a sign protesting Russia's invasion of
Ukraine.


6 WRONG LESSONS FOR TAIWAN FROM THE WAR IN UKRAINE

A potential Asian war would look very different.

A large screen displays China's President Xi Jinping during a virtual summit
with United States President Joe Biden on November 16, 2021 in Beijing.


XI’S CHINA IS GOOD—AND BAD—FOR THE UNITED STATES

The strategic implications of the 20th Party Congress cut in two different
directions.

Olaf Scholz welcomes China's President Xi Jinping at the airport in Hamburg on
July 6, 2017.


OLAF SCHOLZ HAS A CHINA PROBLEM

Germany’s chancellor has insisted on an investment deal with China in
contradiction to his own government’s strategy.

modi-cult-of-personality-matthieu-bourel-illustration-Online_site_1500x1000px_bis


THE CULT OF MODI

How India’s prime minister dismantled the world’s largest democratic experiment.


TRENDING


 1. THE OBVIOUS CLIMATE STRATEGY NOBODY WILL TALK ABOUT
    
    Analysis | Ted Nordhaus, Vijaya Ramachandran, Patrick Brown


 2. THE CULT OF MODI
    
    Essay | Ramachandra Guha


 3. IT’S WOMAN VS. WOMAN IN IRAN’S PROTESTS
    
    Analysis | Anchal Vohra


 4. 6 WRONG LESSONS FOR TAIWAN FROM THE WAR IN UKRAINE
    
    Analysis | Franz-Stefan Gady


 5. CHINA’S ZERO-COVID POLICIES ARE STIRRING XENOPHOBIA
    
    Argument | Amanda Florian

Latest


HOW TO SLOW CLIMATE CHANGE WHILE FIGHTING POVERTY

November 7, 2022, 4:26 PM


THE UNITED STATES’ EASIEST CLIMATE WIN IS IN LATIN AMERICA

November 7, 2022, 3:23 PM


WHAT COULD A REPUBLICAN FOREIGN POLICY LOOK LIKE?

November 7, 2022, 2:56 PM


CHINA’S ZERO-COVID POLICIES ARE STIRRING XENOPHOBIA

November 7, 2022, 2:25 PM


HOW UKRAINE FIGURES IN LAST-MINUTE MIDTERM PITCHES

November 7, 2022, 1:20 PM
See All Stories

Sign up for Morning Brief


FOREIGN POLICY’S FLAGSHIP DAILY NEWSLETTER WITH WHAT’S COMING UP AROUND THE
WORLD TODAY FROM FOREIGN POLICY’S NEWSLETTER WRITER COLM QUINN.


Enter your email Sign Up
✓ Signed Up Unsubscribe
By signing up, I agree to the Privacy Policy and Terms of Use and to
occasionally receive special offers from Foreign Policy.

By signing up, I agree to the Privacy Policy and Terms of Use and to
occasionally receive special offers from Foreign Policy.





By using this website, you agree to our use of cookies. This use includes
personalization of content and ads, and traffic analytics. Review our Privacy
Policy for more information.

Loading graphics
Foreign Policy Magazine
Secondary Navigation
 * FP Events
 * FP Studios
 * FP Analytics
 * FP PeaceGames

 * Subscription Services
 * Group Subscriptions
 * Reprint Permissions
 * Writer’s Guidelines

 * FP Guides – Graduate Education
 * FP For Education
 * FP Archive
 * Buy Back Issues

 * Work At FP
 * Meet the Staff
 * Advertising/Partnerships
 * Country Reports

 * Contact Us
 * Privacy Policy

Powered by WordPress VIP
© 2022, The Slate Group
 * Step 1 of 4: Email alerts
 * Step 2 of 4: Newsletters
 * Step 3 of 4: FP Live
 * Step 4 of 4: Trending

Complete your profile collapse


WELCOME TO A WORLD OF INSIGHT.


EXPLORE THE BENEFITS OF YOUR FP SUBSCRIPTION.

STAY UPDATED ON THE TOPICS YOU CARE ABOUT WITH EMAIL ALERTS. SIGN UP BELOW.

 * Security
 * China
 * U.S. Foreign Policy
 * Geopolitics
 * Foreign & Public Diplomacy
 * Middle East and North Africa
 * Europe
 * Military
 * Russia
 * Politics
 * U.S. State Department
 * United States
 * Africa
 * Iran
 * Southeast Asia
 * Economics
 * United Nations
 * Climate Change
 * Science and Technology
 * Human Rights
 * India

Show more


CHOOSE A FEW NEWSLETTERS THAT INTEREST YOU.


HERE ARE SOME WE THINK YOU MIGHT LIKE.

 * Morning Brief
   
   Your guide to the most important world stories of the day. Delivered
   Monday-Friday.

 * Africa Brief
   
   Essential analysis of the stories shaping geopolitics on the continent.
   Delivered Wednesday.

 * Latin America Brief
   
   One-stop digest of politics, economics, and culture. Delivered Friday.

 * China Brief
   
   The latest news, analysis, and data from the country each week. Delivered
   Wednesday.

 * South Asia Brief
   
   Weekly update on developments in India and its neighbors. Delivered Thursday.

 * Situation Report
   
   Weekly update on what’s driving U.S. national security policy. Delivered
   Thursday.

 * Flash Points
   
   A curated selection of our very best long reads. Delivered Wednesday &
   Sunday.

 * Editors’ Picks
   
   Evening roundup with our editors’ favorite stories of the day. Delivered
   Monday-Saturday.

 * Subscribers’ Picks
   
   A monthly digest of the top articles read by FP subscribers.


ANALYZE THE WORLD’S BIGGEST EVENTS.


JOIN IN-DEPTH CONVERSATIONS AND INTERACT WITH FOREIGN-POLICY EXPERTS WITH

Reporters-notebook-FPLive-site-3-2


REPORTERS’ NOTEBOOK: THE MIDTERMS AND U.S. FOREIGN POLICY

November 3, 2022 | View Now

Midterm elections in the United States are approaching, and the party that
controls Congress will determine the trajectory of the Biden administration’s
domestic and foreign policy. How wi...Show morell federal spending on Ukraine be
impacted by the results? What about relations with China, climate change, and
trade?  Tune in as FP’s executive editor, Amelia Lester, and FP’s team of
reporters answer your questions about what’s at stake for U.S. foreign policy in
the midterms as well as analyze the possible outcomes. 

BEIJING, CHINA - MAY 26: A researcher holds a wafer arrayed with carbon
nanotubes (CNT) at a laboratory on May 26, 2020 in Beijing, China. (Photo by
VCG/VCG via Getty Images)


THE IMPACTS OF U.S.-CHINA TECH DECOUPLING

November 1, 2022 | View Now

The Biden administration is increasingly making clear it is intent on slowing
down China’s technological rise. Washington has dramatically expanded controls
on technology flowing to and fr...Show moreom Beijing by imposing aggressive
sanctions targeting China’s chip and semiconductor industry. What impact will
these changes have on the broader U.S.-China relationship? Will other nations
support Washington’s new approach? How will this impact the global economy? 
Watch FP editor in chief Ravi Agrawal’s conversation with Jon Bateman, a senior
fellow in the Technology and International Affairs Program at the Carnegie
Endowment for International Peace. Bateman previously served as the director for
cyber strategy implementation in the Office of the Secretary of Defense. Read
his essay on U.S.-China decoupling.

Rishi Sunak delivers a keynote speech to COP26 delegates in Glasgow, Scotland,
on Nov. 3, 2021. Christopher Furlong/Getty Images


WHAT RISHI SUNAK MEANS FOR THE WORLD

October 28, 2022 | View Now

Rishi Sunak has come out on top as Britain’s next prime minister, following Liz
Truss’s failed six-week tenure leading the country. He assumes power as the
third British prime minister i...Show moren just two months amid a spiraling
economic crisis and unprecedented political turmoil. He faces numerous
challenges in office: a divided party, soaring inflation, calls for a general
election, and much more.  What’s next for Britain under Sunak’s leadership? Will
he turn the country’s economic woes around, and what will he do about Russia’s
war in Ukraine and China? Join FP’s security and intelligence reporter, Amy
Mackinnon, for a wide-ranging interview with Robin Niblett, a distinguished
fellow at Chatham House, and Anand Menon, a professor of European politics at
King’s College London.


SEE WHAT’S TRENDING.


MOST POPULAR ARTICLES ON FP RIGHT NOW.

Living quarters are flooded in Bangui, Central Africa Republic


THE OBVIOUS CLIMATE STRATEGY NOBODY WILL TALK ABOUT

Economic development is the only proven path to climate resilience.

Members of Iran's Basij Islamist militia wave Iranian flags during a ceremony
marking the 30th anniversary of its establishment at the Imam Khomeini Grand
Mosque in Tehran on Nov. 26, 2009.


IT’S WOMAN VS. WOMAN IN IRAN’S PROTESTS

The Islamic Republic has always cultivated a reservoir of devoted female
support.

A cow grazes in front of the Mooifontein Colliery coal supplier in South Africa.


HOW TO SLOW CLIMATE CHANGE WHILE FIGHTING POVERTY

Falling aid budgets and ballooning debt in the developing world are impediments
to climate action. Green aid projects can bring poorer countries on board.

A disinfectant worker waits outside of a high-speed train.


CHINA’S ZERO-COVID POLICIES ARE STIRRING XENOPHOBIA

Anti-foreign language has become part of disease control.

Next: Newsletters Remind me later My Account