www.washingtonexaminer.com Open in urlscan Pro
2606:4700::6812:55b  Public Scan

URL: https://www.washingtonexaminer.com/news/national-security-council-coordinated-government-response-solarwinds-hack
Submission: On April 30 via api from CA — Scanned from CA

Form analysis 1 forms found in the DOM

https://www.washingtonexaminer.com/search-result

<form class="FixedHeader-search-form" action="https://www.washingtonexaminer.com/search-result" novalidate="" autocomplete="off">
  <input type="text" aria-label="Search" class="FixedHeader-search-input" placeholder="Search Term" name="q" data-searchahead=""> <button type="reset" class="FixedHeader-search-clear">Clear</button> <button type="submit"
    class="FixedHeader-search-submit">Search</button>
</form>

Text Content

 * News
    * White House
    * Senate
    * House
    * Campaigns
    * Business
    * Justice
    * Crime
    * Sunday Talk Shows
    * Washington Secrets

 * Policy
    * Defense & National Security
    * Energy & Environment
    * Education
    * Immigration
    * Finance & Economy
    * Healthcare
    * Foreign Policy
    * Technology
    * Infrastructure
    * Space
    * Think Tanks

 * Opinion
    * Columnists
    * Editorials
    * Beltway Confidential

 * Videos
    * Latest Clips
    * The Debrief
    * Reporter's Notebook

 * Restoring America
 * Newsletters
 * Subscriber Content
    * Member Login
    * Magazine
    * Archive
    * Quarterly Briefing
    * Book of the Month

Sign In| Subscribe
 * My Account
 * WEX Access
 * Contact Us
 * Logout

Clear Search
Sign In| Subscribe
 * My Account
 * WEX Access
 * Contact Us
 * Logout




Saturday, April 29, 2023
Saturday, April 29, 2023
Sign In| Subscribe
 * My Account
 * WEX Access
 * Contact Us
 * Logout

 * News
    * White House
    * Senate
    * House
    * Campaigns
    * Business
    * Justice
    * Crime
    * Sunday Talk Shows
    * Washington Secrets

 * Policy
    * Defense & National Security
    * Energy & Environment
    * Education
    * Immigration
    * Finance & Economy
    * Healthcare
    * Foreign Policy
    * Technology
    * Infrastructure
    * Space
    * Think Tanks

 * Opinion
    * Columnists
    * Editorials
    * Beltway Confidential

 * Videos
    * Latest Clips
    * The Debrief
    * Reporter's Notebook

 * Restoring America
 * Newsletters
 * Subscriber Content
    * Magazine
    * Archive
    * Quarterly Briefing
    * Book of the Month


News


NATIONAL SECURITY COUNCIL SETS UP COORDINATED GOVERNMENT RESPONSE TO SOLARWINDS
HACK

by Jerry Dunleavy, Justice Department Reporter |
December 15, 2020 05:42 PM
 * 
 * 
 * 
 * 
 * 


OPINION

Yes, pro-life can mean pro-birth control
By: Kimberly Ross

Fauci is just a symptom of an incompetent, entrenched bureaucracy
By: Becket Adams

Why does the Left hate success?
By: Jim Nelles



VIDEOS

Reporter’s Notebook: Biden makes 2024 campaign official

The Debrief with Conn Carroll: How consequential is Tucker Carlson's departure
from Fox?

Reporter’s Notebook: What we are learning about the Pentagon leaker

Cammack backs DeSantis's Disney feud: 'Disney inserted themselves into this
fight'



NEWSLETTERS


Sign up now to get the Washington Examiner’s breaking news and timely commentary
delivered right to your inbox.


The National Security Council announced the establishment of a Cyber Unified
Coordination Group to deal with the massive cyberattack believed to have been
conducted by foreign hackers that has rattled the U.S. government as well as
organizations around the world.

“Pursuant to Presidential Policy Directive-41 (26 July 2016) and its Annex, a
Cyber Unified Coordination Group has been established to ensure continued unity
of effort across the United States Government in response to a significant cyber
incident,” NSC spokesman John Ullyot said in a statement on Tuesday. “The UCG
process facilitates continuous and comprehensive coordination for
whole-of-government efforts to identify, mitigate, remediate, and respond to
this incident. The highly-trained and experienced professionals across the
government are working diligently on this matter.”

The Homeland Security Department’s Cybersecurity and Infrastructure Security
agency issued a governmentwide directive just before midnight on Sunday to purge
all federal agency networks of potentially compromised servers after discovering
that, at the very least, the Treasury and Commerce departments were victims of a
monthslong cyberattack campaign suspected by many to be a Russian hacking
effort.

The presidential directive cited by the NSC on Tuesday, signed by then-President
Barack Obama, states that a Cyber Unified Coordination Group “shall serve as the
primary method for coordinating between and among Federal agencies in response
to a significant cyber incident as well as for integrating private sector
partners into incident response efforts, as appropriate” when the NSC requests
its formation or when “a significant cyber incident ... could reasonably result
in catastrophic regional or national effects on public health or safety,
economic security, or national security.”

SolarWinds acknowledged Sunday night that its systems had been compromised by
hackers who infiltrated the company's Orion software updates in order to
distribute malware to its customers' computers.

The U.S. network-management company, which said roughly 18,000 of its customers
were impacted by the cyberattack, removed from its website any mention of its
high-profile customers over the past day. A Google web cache of SolarWinds's
website from Monday shows a "customers" page that boasted its 300,000 customers
included "more than 425 of the US Fortune 500," the 10 biggest
telecommunications companies in the U.S., "all five branches" of the U.S.
military, and a number of different government agencies — including the State
Department, National Security Agency, Justice Department, and the Office of the
President. That list is now gone.

"We are aware of a potential vulnerability which if present is currently
believed to be related to updates which were released between March and June
2020 to our Orion monitoring products," Kevin Thompson, the president and CEO of
the company, told the Washington Examiner in a statement over the weekend. "We
believe that this vulnerability is the result of a highly-sophisticated,
targeted and manual supply chain attack by a nation state."

The Homeland Security Department, the State Department, and the National
Institutes of Health were also victims of the cyberintrusion, according to
“experts” cited by the Washington Post on Monday night.

Secretary of State Mike Pompeo told the Washington Examiner on Monday that he
wouldn’t comment on the alleged Russian hack specifically, though he said that
“it is clear that the Russians continue to engage in malign cyberactivity around
the world.” Pompeo also told Breitbart Radio: “I can’t say much other than it’s
been a consistent effort of the Russians to try and get into American servers."

"The Department of Homeland Security is aware of reports of a breach. We are
currently investigating the matter," DHS spokesman Alexei Woltornist told the
Washington Examiner over the weekend. NIH did not respond to a request for
comment.

“Looking at it right now, don’t have anything definitive,” acting Secretary of
Defense Chris Miller told CBS News on Tuesday when asked if defense networks had
been compromised by the hack. “Obviously, very concerned about it and looking
into it very closely.”

FireEye, a cybersecurity firm that works with government agencies to expose and
fight foreign cyberattacks, reported it discovered a "highly evasive attacker"
infiltrated SolarWinds's Orion software updates. The firm announced last week it
had itself also been hacked.

Vinoth Kumar, a cybersecurity researcher, told Reuters Tuesday he had alerted
SolarWinds last year that the company’s update server could be accessed by
anyone using the password “solarwinds123." The outlet also said Kyle Hanslovan,
CEO of the Huntress cybersecurity firm, “noticed that, even days after
SolarWinds realized their software had been compromised, the malicious updates
were still available for download.”



If Russian culpability is established for the hacks of U.S. government agencies,
it would harken back to Russia’s large-scale hacking of the State Department in
2014. Actors affiliated with Russian military intelligence were also named by
the U.S. as being responsible for the hacking of the Democratic National
Committee’s email systems in 2016.


OPINION

Yes, pro-life can mean pro-birth control
By: Kimberly Ross

Fauci is just a symptom of an incompetent, entrenched bureaucracy
By: Becket Adams

Why does the Left hate success?
By: Jim Nelles



VIDEOS

Reporter’s Notebook: Biden makes 2024 campaign official

The Debrief with Conn Carroll: How consequential is Tucker Carlson's departure
from Fox?

Reporter’s Notebook: What we are learning about the Pentagon leaker

Cammack backs DeSantis's Disney feud: 'Disney inserted themselves into this
fight'



NEWSLETTERS


Sign up now to get the Washington Examiner’s breaking news and timely commentary
delivered right to your inbox.

News
NSC
Cybersecurity
National Security
 * 
 * 
 * 
 * 
 * 

Share your thoughts with friends.
Paid Content



Manage Cookies
 * About Examiner
 * Magazine Archive
 * Staff
 * Policies and Standards
 * Sitemap
 * Terms Of Service
 * Privacy Policy
 * Your Privacy Choice
 * Transparency In Coverage
 * Advertise
 * Contact
 * Subscribe
 * Newsletters
 * Careers
 * Facebook
 * Twitter

COPYRIGHT 2023. WASHINGTON EXAMINER. ALL RIGHTS RESERVED.



We and certain third parties may use cookies or similar technologies to process
data when you visit our sites. This data may relate to your use of our sites,
your preferences, your device, or other information about you. We and third
parties may use this information for a variety of purposes, such as enabling the
sites to function, to personalize your experience when using our sites, to
provide you with advertisements based on your interests, and for analytical
purposes. Privacy Notice

Manage Cookies Reject All Accept All



PRIVACY PREFERENCE CENTER

You may use the category buttons below to enable or disable cookies or similar
technologies used for each purpose. Click on the different category headings to
find out more and change our default settings. Disabling some types of cookies
or similar technologies may impact your experience when using our sites. You may
disable all cookies/similar technologies (except those that are strictly
necessary) by changing your settings below. The cookie preference tool is device
and browser specific. If you delete or clear cookies or change devices or
browsers, you may need to reset your cookie preferences. You may also enable the
Global Privacy Control to opt out of targeted advertising.
More information
Allow All


MANAGE CONSENT PREFERENCES

ESSENTIAL COOKIES

Always Active

These technologies are necessary for us to deliver our services to you. For
example, these technologies allow us to load content on the page, perform
security functions, or store mandatory preferences (e.g. opt-out of sale
preferences). These technologies cannot be disabled, and if you configure your
browser to block these features, our services or certain features may not
function.

TARGETED ADVERTISING COOKIES

Targeted Advertising Cookies

These cookies enable us and our advertising partners to serve you with relevant
targeted advertisements based on your interests and profiles held by us or our
advertising partners and ad networks. You might see these advertisements on our
sites or on other sites you visit. These technologies may collect information
about you on our site, as well as third-party sites, and these technologies may
be used to associate the information collected across sites and contexts. If you
disable these technologies, you will still see ads, but they may be less
relevant.

ANALYTICS COOKIES

Analytics Cookies

These technologies are used to analyze the use and performance of our services
so that we can measure and improve those services. For example, we may create
analytics designed to understand how many people visit our websites, how they
reach us, how they navigate the services, how the service performs, and what
content is popular. This allows us to improve your experience on our services,
and if you disable these services, our sites may not perform optimally.

FUNCTIONAL COOKIES

Functional Cookies

These technologies are used to provide specific features or functions of our
site or to personalize your experience. For example, these technologies are used
to maintain log-in sessions for registered users or to store your preferences
(e.g. regarding the use of cookies). If you disable these technologies, the
features may not function properly, and you may be required to reconfigure your
preferences.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices


advertisement
advertisement
advertisement