www.cnet.com Open in urlscan Pro
2a04:4e42:4d::666  Public Scan

Submitted URL: https://www.cnet.com/news/major-hack-of-us-agencies-may-have-started-with-software-company-solarwinds/
Effective URL: https://www.cnet.com/news/privacy/major-hack-of-us-agencies-may-have-started-with-software-company-solarwinds/
Submission: On May 01 via api from CA — Scanned from CA

Form analysis 1 forms found in the DOM

<form novalidate="novalidate" class="c-newsletterSticky_form u-flexbox-column">
  <div class="c-newsletterSticky_inputContainer"><!----> <input placeholder="Add your email address" name="newsletter_email" required="required" type="email" class="
              c-newsletterSticky_input
              g-inner-spacing-left-medium
              g-inner-spacing-right-medium
              g-container-rounded-small
              g-text-xxsmall
              g-color-text-meta
            "></div>
  <div class="c-newsletterSticky_checkboxContainer u-flexbox u-flexbox-alignCenter"><input type="checkbox" name="newsletter_optional" checked="checked"> <span class="g-text-xxxsmall">Yes, I also want to receive the CNET Insider newsletter, keeping me
      up to date with all things CNET.</span></div>
  <div class="c-newsletterSticky_buttonAndPrivacy"><input type="submit" value="Subscribe" class="c-newsletterSubscribe_button o-button o-button-medium o-button-smallRound c-newsletterSticky_button g-outer-spacing-bottom-medium o-button-primary">
    <div class="c-newsletterSticky_privacy g-text-xxxsmall g-color-text-meta">By signing up, you will receive newsletters and promotional content and agree to our
      <a href="https://www.redventures.com/legal/cmg-terms-of-use" target="_blank">Terms of Use</a> and acknowledge the data practices in our <a href="https://www.cnet.com/privacy-policy/" target="_blank">Privacy Policy</a>. You may unsubscribe at
      any time.</div>
  </div>
</form>

Text Content

Want CNET to notify you of price drops and the latest stories?
No, thank you Accept
X

Google Pixel TabletBest Gifts for MomGreen Revolution vs. Red TapeIn-Ear vs.
Behind-Ear Hearing AidsComparing Mortgage RatesBest Solar BatteriesVerizon 5G
Home Internet15 Hidden iOS 16 Features
Join/Login

Your guide to a better future

Join/Login


x

player version3.2.2playback state1duration3current time0.00buffer
length0.00average dropped (fps)0.00




Start video Replay video Large play-pause toggle
Play pause
00:00 00:03 Live
Closed captions Settings Volume Fullscreen



Learn More

Click to unmute


Share this video

Direct link

copy

Embed code

copy
Hands-On Acer Aspire S Series
 * News
 * Privacy
   


MAJOR HACK OF US AGENCIES MAY HAVE STARTED WITH SOFTWARE COMPANY SOLARWINDS

The hack of the federal agencies appears to have originated from a backdoor
planted in an IT firm.

Eli Blumenthal Senior Editor
Eli Blumenthal is a senior editor at CNET with a particular focus on covering
the latest in the ever-changing worlds of telecom, streaming and sports. He
previously worked as a technology reporter at USA Today.
Expertise 5G, mobile networks, wireless carriers, phones, tablets, streaming
devices, streaming platforms, mobile and console gaming,
See full bio
Eli Blumenthal
Dec. 15, 2020 5:19 p.m. PT
2 min read


In this photo illustration, a hacker uses a computer.

Chesnot/Getty Images

More details are coming out about revelations that several US government
agencies were hacked. The suspected Russian hack was enabled by a back door
built into software from Austin-based IT firm SolarWinds, according to a report
from The Wall Street Journal on Tuesday. 

The access point was apparently SolarWinds' Orion network management software.
Once hackers added a backdoor to the Orion code, the "software connected to a
server controlled by the hackers that allowed them to launch further attacks
against the SolarWinds customer and to steal data," reported the Journal. 




In a filing with the Securities and Exchange Commission on Monday, SolarWinds
said the vulnerable Orion updates were delivered to customers between March and
June, and as many as 18,000 customers may have downloaded the software. The
Journal report, however, notes that "investigators expect the total number of
victims to be much smaller."

SolarWinds declined to comment.

The hack was spotted a few weeks ago "only when a private cybersecurity firm,
FireEye, alerted American intelligence that the hackers had evaded layers of
defenses," according to The New York Times.




See also: How to avoid a spear-phishing attack. 4 tips to keep you safe from
timeless scams



A coalition of tech firms seized a domain that was used in the hack, ZDNet
reported on Tuesday. The move was taken to prevent the spread of further
instructions to infected computers.

The Commerce Department confirmed the news of the hack over the weekend, with
the Times reporting that other agencies including the State Department, the
Pentagon and the Department of Homeland Security were also impacted. 

"We can confirm there has been a breach in one of our bureaus," a Commerce
spokesperson said on Sunday. "We have asked CISA and the FBI to investigate, and
we cannot comment further at this time."

CNET's Steven Musil contributed to this report. 

First published on Dec. 15, 2020 8:46 a.m. PT




GET THE CNET HOME NEWSLETTER

Bring your home up to speed with the latest on automation, security, utilities,
networking and more.
Yes, I also want to receive the CNET Insider newsletter, keeping me up to date
with all things CNET.
By signing up, you will receive newsletters and promotional content and agree to
our Terms of Use and acknowledge the data practices in our Privacy Policy. You
may unsubscribe at any time.







 * More From CNET
 * Deals
 * Reviews
 * Best Products
 * Gift Guide
 * Shopping Extension
 * Videos

 * About
 * About CNET
 * Newsletters
 * Sitemap
 * Careers

 * Policies
 * Cookie Settings
 * Help Center
 * Licensing
 * Privacy Policy
 * Terms of Use
 * Do Not Sell or Share My Personal Information

 * instagram
 * youtube
 * tiktok
 * facebook
 * twitter
 * flipboard

© 2023 CNET, a Red Ventures company. All rights reserved.
US France Germany Japan Korea

Cookie Settings