SolarWinds Hackers got into U.S. Justice Department emails

The SolarWinds hackers could gain access to three percent of U.S. Justice Office 365 mailboxes in what the department classifies as a “major incident.”

The Justice Department said it learned Dec. 24 that Russian spies had infiltrated the region’s Microsoft Office 365 environment, department spokesman Marc Raimondi said Wednesday. After learning about this malicious activity, the Department of Justice said it had removed the method identified by which the hacker was accessing the department’s Office 365 email environment.

“At this stage, the number of potentially accessible Office 365 mailboxes appears to be around 3 per cent, and we have no indication that any scheduled systems have been affected,” Raimondi said in a statement.

[Related: SolarWinds Hit With Class-Action Lawsuit Alleging Securities Violations]

The news makes the Department of Justice at least the eighth largest body of the U.S. government reportedly beaten by SolarWinds hackers. Official publications and media reports have indicated that the Department of Commerce, Department of Defense, Department of Energy, Department of Homeland Security, National Institute of Health, Department of State and Department of Finance were also at risk.

Nearly ten federal agencies reported continued activity on their systems after they were compromised through a malicious update on their SolarWinds Orion network monitoring platform, the Unified Coordinating Group of Cyber ​​announced SA (UCG) yesterday. The UCG also said that the Russian Advanced Sustained Risk Group (APT) appears to be behind the SolarWinds breach for information gathering purposes.

As part of its ongoing technical analysis, the Department of Justice stated that it has determined that the Office 365 compromise is a key event under the Federal Information Security Update Act, and that it is taking steps that are consistent with its compliance. that decision. The department said it will continue to contact the relevant federal agencies, Congress, and the public as needed, according to Raimondi.

The Justice Department discovered their Office 365 compromise just two days after the New York Times reported that hackers had caught Microsoft’s fault for the email system used by the U.S. Treasury chief. introduction. The hackers took a complex step within Office 365 to create encrypted “tokens” that tricked the Treasury system into thinking that the hackers were legitimate users.

That led the Treasury system to think the hackers were legitimate users, meaning that the hackers were able to sign in without measuring usernames and passwords. , Sen. Ron Wyden, D-Ore., told The Times on Dec. 22. Likely. the Department of Justice, Treasury Department also did not see any evidence that hackers had hacked into their classified systems, Secretary Steven Mnuchin said.

One day before the Justice Department discovered its breach, CrowdStrike revealed that hackers had tried to attack the endpoint security giant through Microsoft’s Azure resale account. The vendor’s Azure account was used to manage CrowdStrike’s Microsoft Office licenses, and the hackers failed in their attempt to read the company’s email, CrowdStrike said.

Microsoft told CRN Dec. 24 that if a customer buys a cloud service from resale and allows the vendor to maintain administrative access, the negotiation of resale credentials would allow the customer’s subscriber. Access abuse would not be a compromise of Microsoft services themselves, according to the company.

Reuters reported on Dec. 17 that Microsoft had been compromised through SolarWinds, with suspicions that Russian spies were then using Microsoft ‘s own products to further the attacks on other victims. Microsoft said at the time that sources for the Reuters report were “misusing or misinterpreting their information,” but acknowledged that the software giant had found “SolarWinds’ malicious binaries.” in its environment.

Microsoft confirmed Dec. 31 that no signs were found that its systems had been used to attack others.

.Source