www.cnet.com
Open in
urlscan Pro
2a04:4e42:4d::666
Public Scan
Submitted URL: https://www.cnet.com/news/major-hack-of-us-agencies-may-have-started-with-software-company-solarwinds/
Effective URL: https://www.cnet.com/news/privacy/major-hack-of-us-agencies-may-have-started-with-software-company-solarwinds/
Submission: On May 01 via api from CA — Scanned from CA
Effective URL: https://www.cnet.com/news/privacy/major-hack-of-us-agencies-may-have-started-with-software-company-solarwinds/
Submission: On May 01 via api from CA — Scanned from CA
Form analysis
1 forms found in the DOM<form novalidate="novalidate" class="c-newsletterSticky_form u-flexbox-column">
<div class="c-newsletterSticky_inputContainer"><!----> <input placeholder="Add your email address" name="newsletter_email" required="required" type="email" class="
c-newsletterSticky_input
g-inner-spacing-left-medium
g-inner-spacing-right-medium
g-container-rounded-small
g-text-xxsmall
g-color-text-meta
"></div>
<div class="c-newsletterSticky_checkboxContainer u-flexbox u-flexbox-alignCenter"><input type="checkbox" name="newsletter_optional" checked="checked"> <span class="g-text-xxxsmall">Yes, I also want to receive the CNET Insider newsletter, keeping me
up to date with all things CNET.</span></div>
<div class="c-newsletterSticky_buttonAndPrivacy"><input type="submit" value="Subscribe" class="c-newsletterSubscribe_button o-button o-button-medium o-button-smallRound c-newsletterSticky_button g-outer-spacing-bottom-medium o-button-primary">
<div class="c-newsletterSticky_privacy g-text-xxxsmall g-color-text-meta">By signing up, you will receive newsletters and promotional content and agree to our
<a href="https://www.redventures.com/legal/cmg-terms-of-use" target="_blank">Terms of Use</a> and acknowledge the data practices in our <a href="https://www.cnet.com/privacy-policy/" target="_blank">Privacy Policy</a>. You may unsubscribe at
any time.</div>
</div>
</form>
Text Content
Want CNET to notify you of price drops and the latest stories? No, thank you Accept X Google Pixel TabletBest Gifts for MomGreen Revolution vs. Red TapeIn-Ear vs. Behind-Ear Hearing AidsComparing Mortgage RatesBest Solar BatteriesVerizon 5G Home Internet15 Hidden iOS 16 Features Join/Login Your guide to a better future Join/Login x player version3.2.2playback state1duration3current time0.00buffer length0.00average dropped (fps)0.00 Start video Replay video Large play-pause toggle Play pause 00:00 00:03 Live Closed captions Settings Volume Fullscreen Learn More Click to unmute Share this video Direct link copy Embed code copy Hands-On Acer Aspire S Series * News * Privacy MAJOR HACK OF US AGENCIES MAY HAVE STARTED WITH SOFTWARE COMPANY SOLARWINDS The hack of the federal agencies appears to have originated from a backdoor planted in an IT firm. Eli Blumenthal Senior Editor Eli Blumenthal is a senior editor at CNET with a particular focus on covering the latest in the ever-changing worlds of telecom, streaming and sports. He previously worked as a technology reporter at USA Today. Expertise 5G, mobile networks, wireless carriers, phones, tablets, streaming devices, streaming platforms, mobile and console gaming, See full bio Eli Blumenthal Dec. 15, 2020 5:19 p.m. PT 2 min read In this photo illustration, a hacker uses a computer. Chesnot/Getty Images More details are coming out about revelations that several US government agencies were hacked. The suspected Russian hack was enabled by a back door built into software from Austin-based IT firm SolarWinds, according to a report from The Wall Street Journal on Tuesday. The access point was apparently SolarWinds' Orion network management software. Once hackers added a backdoor to the Orion code, the "software connected to a server controlled by the hackers that allowed them to launch further attacks against the SolarWinds customer and to steal data," reported the Journal. In a filing with the Securities and Exchange Commission on Monday, SolarWinds said the vulnerable Orion updates were delivered to customers between March and June, and as many as 18,000 customers may have downloaded the software. The Journal report, however, notes that "investigators expect the total number of victims to be much smaller." SolarWinds declined to comment. The hack was spotted a few weeks ago "only when a private cybersecurity firm, FireEye, alerted American intelligence that the hackers had evaded layers of defenses," according to The New York Times. See also: How to avoid a spear-phishing attack. 4 tips to keep you safe from timeless scams A coalition of tech firms seized a domain that was used in the hack, ZDNet reported on Tuesday. The move was taken to prevent the spread of further instructions to infected computers. The Commerce Department confirmed the news of the hack over the weekend, with the Times reporting that other agencies including the State Department, the Pentagon and the Department of Homeland Security were also impacted. "We can confirm there has been a breach in one of our bureaus," a Commerce spokesperson said on Sunday. "We have asked CISA and the FBI to investigate, and we cannot comment further at this time." CNET's Steven Musil contributed to this report. First published on Dec. 15, 2020 8:46 a.m. PT GET THE CNET HOME NEWSLETTER Bring your home up to speed with the latest on automation, security, utilities, networking and more. Yes, I also want to receive the CNET Insider newsletter, keeping me up to date with all things CNET. By signing up, you will receive newsletters and promotional content and agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time. * More From CNET * Deals * Reviews * Best Products * Gift Guide * Shopping Extension * Videos * About * About CNET * Newsletters * Sitemap * Careers * Policies * Cookie Settings * Help Center * Licensing * Privacy Policy * Terms of Use * Do Not Sell or Share My Personal Information * instagram * youtube * tiktok * facebook * twitter * flipboard © 2023 CNET, a Red Ventures company. All rights reserved. US France Germany Japan Korea Cookie Settings