www.washingtonexaminer.com
Open in
urlscan Pro
2606:4700::6812:55b
Public Scan
URL:
https://www.washingtonexaminer.com/news/national-security-council-coordinated-government-response-solarwinds-hack
Submission: On April 30 via api from CA — Scanned from CA
Submission: On April 30 via api from CA — Scanned from CA
Form analysis
1 forms found in the DOMhttps://www.washingtonexaminer.com/search-result
<form class="FixedHeader-search-form" action="https://www.washingtonexaminer.com/search-result" novalidate="" autocomplete="off">
<input type="text" aria-label="Search" class="FixedHeader-search-input" placeholder="Search Term" name="q" data-searchahead=""> <button type="reset" class="FixedHeader-search-clear">Clear</button> <button type="submit"
class="FixedHeader-search-submit">Search</button>
</form>
Text Content
* News * White House * Senate * House * Campaigns * Business * Justice * Crime * Sunday Talk Shows * Washington Secrets * Policy * Defense & National Security * Energy & Environment * Education * Immigration * Finance & Economy * Healthcare * Foreign Policy * Technology * Infrastructure * Space * Think Tanks * Opinion * Columnists * Editorials * Beltway Confidential * Videos * Latest Clips * The Debrief * Reporter's Notebook * Restoring America * Newsletters * Subscriber Content * Member Login * Magazine * Archive * Quarterly Briefing * Book of the Month Sign In| Subscribe * My Account * WEX Access * Contact Us * Logout Clear Search Sign In| Subscribe * My Account * WEX Access * Contact Us * Logout Saturday, April 29, 2023 Saturday, April 29, 2023 Sign In| Subscribe * My Account * WEX Access * Contact Us * Logout * News * White House * Senate * House * Campaigns * Business * Justice * Crime * Sunday Talk Shows * Washington Secrets * Policy * Defense & National Security * Energy & Environment * Education * Immigration * Finance & Economy * Healthcare * Foreign Policy * Technology * Infrastructure * Space * Think Tanks * Opinion * Columnists * Editorials * Beltway Confidential * Videos * Latest Clips * The Debrief * Reporter's Notebook * Restoring America * Newsletters * Subscriber Content * Magazine * Archive * Quarterly Briefing * Book of the Month News NATIONAL SECURITY COUNCIL SETS UP COORDINATED GOVERNMENT RESPONSE TO SOLARWINDS HACK by Jerry Dunleavy, Justice Department Reporter | December 15, 2020 05:42 PM * * * * * OPINION Yes, pro-life can mean pro-birth control By: Kimberly Ross Fauci is just a symptom of an incompetent, entrenched bureaucracy By: Becket Adams Why does the Left hate success? By: Jim Nelles VIDEOS Reporter’s Notebook: Biden makes 2024 campaign official The Debrief with Conn Carroll: How consequential is Tucker Carlson's departure from Fox? Reporter’s Notebook: What we are learning about the Pentagon leaker Cammack backs DeSantis's Disney feud: 'Disney inserted themselves into this fight' NEWSLETTERS Sign up now to get the Washington Examiner’s breaking news and timely commentary delivered right to your inbox. The National Security Council announced the establishment of a Cyber Unified Coordination Group to deal with the massive cyberattack believed to have been conducted by foreign hackers that has rattled the U.S. government as well as organizations around the world. “Pursuant to Presidential Policy Directive-41 (26 July 2016) and its Annex, a Cyber Unified Coordination Group has been established to ensure continued unity of effort across the United States Government in response to a significant cyber incident,” NSC spokesman John Ullyot said in a statement on Tuesday. “The UCG process facilitates continuous and comprehensive coordination for whole-of-government efforts to identify, mitigate, remediate, and respond to this incident. The highly-trained and experienced professionals across the government are working diligently on this matter.” The Homeland Security Department’s Cybersecurity and Infrastructure Security agency issued a governmentwide directive just before midnight on Sunday to purge all federal agency networks of potentially compromised servers after discovering that, at the very least, the Treasury and Commerce departments were victims of a monthslong cyberattack campaign suspected by many to be a Russian hacking effort. The presidential directive cited by the NSC on Tuesday, signed by then-President Barack Obama, states that a Cyber Unified Coordination Group “shall serve as the primary method for coordinating between and among Federal agencies in response to a significant cyber incident as well as for integrating private sector partners into incident response efforts, as appropriate” when the NSC requests its formation or when “a significant cyber incident ... could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.” SolarWinds acknowledged Sunday night that its systems had been compromised by hackers who infiltrated the company's Orion software updates in order to distribute malware to its customers' computers. The U.S. network-management company, which said roughly 18,000 of its customers were impacted by the cyberattack, removed from its website any mention of its high-profile customers over the past day. A Google web cache of SolarWinds's website from Monday shows a "customers" page that boasted its 300,000 customers included "more than 425 of the US Fortune 500," the 10 biggest telecommunications companies in the U.S., "all five branches" of the U.S. military, and a number of different government agencies — including the State Department, National Security Agency, Justice Department, and the Office of the President. That list is now gone. "We are aware of a potential vulnerability which if present is currently believed to be related to updates which were released between March and June 2020 to our Orion monitoring products," Kevin Thompson, the president and CEO of the company, told the Washington Examiner in a statement over the weekend. "We believe that this vulnerability is the result of a highly-sophisticated, targeted and manual supply chain attack by a nation state." The Homeland Security Department, the State Department, and the National Institutes of Health were also victims of the cyberintrusion, according to “experts” cited by the Washington Post on Monday night. Secretary of State Mike Pompeo told the Washington Examiner on Monday that he wouldn’t comment on the alleged Russian hack specifically, though he said that “it is clear that the Russians continue to engage in malign cyberactivity around the world.” Pompeo also told Breitbart Radio: “I can’t say much other than it’s been a consistent effort of the Russians to try and get into American servers." "The Department of Homeland Security is aware of reports of a breach. We are currently investigating the matter," DHS spokesman Alexei Woltornist told the Washington Examiner over the weekend. NIH did not respond to a request for comment. “Looking at it right now, don’t have anything definitive,” acting Secretary of Defense Chris Miller told CBS News on Tuesday when asked if defense networks had been compromised by the hack. “Obviously, very concerned about it and looking into it very closely.” FireEye, a cybersecurity firm that works with government agencies to expose and fight foreign cyberattacks, reported it discovered a "highly evasive attacker" infiltrated SolarWinds's Orion software updates. The firm announced last week it had itself also been hacked. Vinoth Kumar, a cybersecurity researcher, told Reuters Tuesday he had alerted SolarWinds last year that the company’s update server could be accessed by anyone using the password “solarwinds123." The outlet also said Kyle Hanslovan, CEO of the Huntress cybersecurity firm, “noticed that, even days after SolarWinds realized their software had been compromised, the malicious updates were still available for download.” If Russian culpability is established for the hacks of U.S. government agencies, it would harken back to Russia’s large-scale hacking of the State Department in 2014. Actors affiliated with Russian military intelligence were also named by the U.S. as being responsible for the hacking of the Democratic National Committee’s email systems in 2016. OPINION Yes, pro-life can mean pro-birth control By: Kimberly Ross Fauci is just a symptom of an incompetent, entrenched bureaucracy By: Becket Adams Why does the Left hate success? By: Jim Nelles VIDEOS Reporter’s Notebook: Biden makes 2024 campaign official The Debrief with Conn Carroll: How consequential is Tucker Carlson's departure from Fox? Reporter’s Notebook: What we are learning about the Pentagon leaker Cammack backs DeSantis's Disney feud: 'Disney inserted themselves into this fight' NEWSLETTERS Sign up now to get the Washington Examiner’s breaking news and timely commentary delivered right to your inbox. News NSC Cybersecurity National Security * * * * * Share your thoughts with friends. Paid Content Manage Cookies * About Examiner * Magazine Archive * Staff * Policies and Standards * Sitemap * Terms Of Service * Privacy Policy * Your Privacy Choice * Transparency In Coverage * Advertise * Contact * Subscribe * Newsletters * Careers * Facebook * Twitter COPYRIGHT 2023. WASHINGTON EXAMINER. ALL RIGHTS RESERVED. We and certain third parties may use cookies or similar technologies to process data when you visit our sites. This data may relate to your use of our sites, your preferences, your device, or other information about you. We and third parties may use this information for a variety of purposes, such as enabling the sites to function, to personalize your experience when using our sites, to provide you with advertisements based on your interests, and for analytical purposes. Privacy Notice Manage Cookies Reject All Accept All PRIVACY PREFERENCE CENTER You may use the category buttons below to enable or disable cookies or similar technologies used for each purpose. Click on the different category headings to find out more and change our default settings. Disabling some types of cookies or similar technologies may impact your experience when using our sites. You may disable all cookies/similar technologies (except those that are strictly necessary) by changing your settings below. The cookie preference tool is device and browser specific. If you delete or clear cookies or change devices or browsers, you may need to reset your cookie preferences. You may also enable the Global Privacy Control to opt out of targeted advertising. More information Allow All MANAGE CONSENT PREFERENCES ESSENTIAL COOKIES Always Active These technologies are necessary for us to deliver our services to you. For example, these technologies allow us to load content on the page, perform security functions, or store mandatory preferences (e.g. opt-out of sale preferences). These technologies cannot be disabled, and if you configure your browser to block these features, our services or certain features may not function. TARGETED ADVERTISING COOKIES Targeted Advertising Cookies These cookies enable us and our advertising partners to serve you with relevant targeted advertisements based on your interests and profiles held by us or our advertising partners and ad networks. You might see these advertisements on our sites or on other sites you visit. These technologies may collect information about you on our site, as well as third-party sites, and these technologies may be used to associate the information collected across sites and contexts. If you disable these technologies, you will still see ads, but they may be less relevant. ANALYTICS COOKIES Analytics Cookies These technologies are used to analyze the use and performance of our services so that we can measure and improve those services. For example, we may create analytics designed to understand how many people visit our websites, how they reach us, how they navigate the services, how the service performs, and what content is popular. This allows us to improve your experience on our services, and if you disable these services, our sites may not perform optimally. FUNCTIONAL COOKIES Functional Cookies These technologies are used to provide specific features or functions of our site or to personalize your experience. For example, these technologies are used to maintain log-in sessions for registered users or to store your preferences (e.g. regarding the use of cookies). If you disable these technologies, the features may not function properly, and you may be required to reconfigure your preferences. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices advertisement advertisement advertisement