apnews.com Open in urlscan Pro
34.96.72.156  Public Scan

URL: https://apnews.com/article/technology-hacking-coronavirus-pandemic-russia-350ae2fb2e513772a4dc4b7360b8175c
Submission: On April 30 via api from CA — Scanned from CA

Form analysis 2 forms found in the DOM

<form class="headerForm-0-2-5 headerNavigationForm-0-2-4 -forDesktop" novalidate="">
  <div style="display: none;">
    <div id="" class="g-recaptcha">
      <div style="width: 304px; height: 78px;">
        <div><iframe title="reCAPTCHA"
            src="https://recaptcha.net/recaptcha/api2/anchor?ar=1&amp;k=6LcUNQcjAAAAAIu8-hEKGDr7xxKi3O4yU0oKtl_7&amp;co=aHR0cHM6Ly9hcG5ld3MuY29tOjQ0Mw..&amp;hl=en&amp;v=4q6CtudrwcI-LSEYlfoEbDXg&amp;theme=light&amp;size=normal&amp;cb=x790vbxxv9lg"
            width="304" height="78" role="presentation" name="a-ef4b2jb10hp6" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
        </div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
          style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;"></iframe>
    </div>
  </div>
  <div style="display: block; width: max-content;"><label for="email">Email:</label><svg class="SvgSprite">
      <use xlink:href="/dist/spritemap.svg#sprite-share-email-borderless"></use>
    </svg><input type="text" name="email" class="news-letter-input" value="Get AP News stories every morning"><button class="news-letter-button">Go</button></div>
</form>

<form id="adl-user-report-form" novalidate="">
  <div style="padding:0; margin: 0 0 0;">
    <div style="width:100%;display:none;height: 35px;line-height:35px;font-size:13px;padding:0 12px;color:white;background-color:#FF3860;border-radius:2px;margin-bottom:10px; " id="adl-category-error">Please make a selection.</div>
    <label style="display: block;line-height: 0; font-size: 16px; margin: 15px 0 15px;">
      <input style="margin:0 8px 0 0;vertical-align: middle;transform: translateY(-0.15em);-webkit-appearance: radio;box-sizing: border-box;" type="radio" name="category" value="Plays Sound" required=""> Plays sound </label>
    <label style="display: block;line-height: 0; font-size: 16px; margin: 15px 0 15px;">
      <input style="margin:0 8px 0 0;vertical-align: middle;transform: translateY(-0.15em);-webkit-appearance: radio;box-sizing: border-box;" type="radio" name="category" value="Adult Content" required=""> Contains adult content </label>
    <label style="display: block;line-height: 0; font-size: 16px; margin: 15px 0 15px;">
      <input style="margin:0 8px 0 0;vertical-align: middle;transform: translateY(-0.15em);-webkit-appearance: radio;box-sizing: border-box;" type="radio" name="category" value="Covers the Page" required=""> Covers the page </label>
    <label style="display: block;line-height: 0; font-size: 16px; margin: 15px 0 15px;">
      <input style="margin:0 8px 0 0;vertical-align: middle;transform: translateY(-0.15em);-webkit-appearance: radio;box-sizing: border-box;" type="radio" name="category" value="Other" required=""> Other </label>
    <h2 style="font-size:20px;font-weight:bold;color:rgb(58,58,58);text-align:left;margin:25px 0 15px;">Additional Information</h2>
    <div style="width:100%;display:none;height: 35px;line-height:35px;font-size:13px;padding:0 12px;color:white;background-color:#FF3860;border-radius:2px;margin-bottom:10px; " id="adl-text-minlen-error">Please help us by describing the ad.</div>
    <div style="width:100%;display:none;height: 35px;line-height:35px;font-size:13px;padding:0 12px;color:white;background-color:#FF3860;border-radius:2px;margin-bottom:10px; " id="adl-text-maxlen-error">Only 500 characters are allowed.</div>
    <textarea id="adl-user-feedback" style="box-sizing:border-box;resize: none; margin:0;width:100%;font-size:14px;line-height:18px;height:100px;border:1px solid #B0B0B0;padding:11px 15px;border-radius:2px;" minlength="3" maxlength="500"
      placeholder="What does the ad say, who is the advertiser, what does the ad look like?" name="user_feedback"></textarea>
  </div>
  <button type="button"
    style="margin-left:auto;margin-right:auto;margin: 20px auto 0;width:200px;cursor:pointer;background-color:#7c6bf7;display:block;color:#fff;border-radius:2px;border:none;padding:15px 40px;font-weight:700;text-align:center;box-sizing:border-box;font-size:16px;"
    id="adl-report-ad-modal__submit-button">Report ad</button>
</form>

Text Content

Enable accessibility
AP NEWS

Email:Go
Listen

Sections
 * U.S. News
 * World News
 * Politics
 * Sports
 * Entertainment
 * Business
 * Technology
 * Health
 * Science
 * Oddities
 * Lifestyle
 * Photography
 * Videos

Listen
AP RADIO
Update hourly


Sections
 1.  AP Top News
 2.  U.S. News
 3.  World NewsLatest on Russia-Ukraine warAfricaAsia
     PacificAustraliaEuropeLatin AmericaMiddle East
 4.  PoliticsPresident BidenCongressSupreme CourtElection 2023
 5.  SportsMLBNBANHLNFLTennisGolf
 6.  EntertainmentFilm reviewsMoviesMusicTelevisionFashion
 7.  BusinessU.S. economyFinancial markets

     --------------------------------------------------------------------------------

 8.  Videos
 9.  Technology
 10. HealthCOVID-19
 11. MoreAP InvestigationsClimate and
     environmentOdditiesPhotographyTravelScienceAP Fact
     CheckLifestyleReligionPress Releases

 * King's Coronation
 * NFL draft
 * Latest on Russia-Ukraine war
 * Met Gala
 * More news

Search



ADVERTISEMENT

https://apnews.com/article/technology-hacking-coronavirus-pandemic-russia-350ae2fb2e513772a4dc4b7360b8175c
Click to copy
https://apnews.com/article/technology-hacking-coronavirus-pandemic-russia-350ae2fb2e513772a4dc4b7360b8175c
Click to copy
Related topics
 * Hacking
 * Technology
 * Russia
 * AP Top News
 * Coronavirus pandemic
 * Politics


HACK MAY HAVE EXPOSED DEEP US SECRETS; DAMAGE YET UNKNOWN



By FRANK BAJAKDecember 15, 2020


1 of 2
FILE - The U.S. Treasury Department building viewed from the Washington
Monument, Wednesday, Sept. 18, 2019, in Washington. Hackers got into computers
at the U.S. Treasury Department and possibly other federal agencies, touching
off a government response involving the National Security Council. Security
Council spokesperson John Ullyot said Sunday, Dec. 13, 2020 that the government
is aware of reports about the hacks. (AP Photo/Patrick Semansky, file)


BOSTON (AP) — Some of America’s most deeply held secrets may have been stolen in
a disciplined, monthslong operation being blamed on elite Russian government
hackers. The possibilities of what might have been purloined are mind-boggling.

Could hackers have obtained nuclear secrets? COVID-19 vaccine data? Blueprints
for next-generation weapons systems?

It will take weeks, maybe years in some cases, for digital sleuths combing
through U.S. government and private industry networks to get the answers. These
hackers are consummate pros at covering their tracks, experts say. Some theft
may never be detected.



What’s seems clear is that this campaign — which cybersecurity experts says
exhibits the tactics and techniques of Russia’s SVR foreign intelligence agency
— will rank among the most prolific in the annals of cyberespionage.

U.S. government agencies, including the Treasury and Commerce departments, were
among dozens of high-value public- and private-sector targets known to have been
infiltrated as far back as March through a commercial software update
distributed to thousands of companies and government agencies worldwide. A
Pentagon statement Monday indicated it used the software. It said it had “issued
guidance and directives to protect” its networks. It would not say — for
“operational security reasons” — whether any of its systems may have been
hacked.

Read More:
 * – US agencies, companies secure networks after huge hack
 * – EXPLAINER: How bad is the hack that targeted US agencies?
 * – Cybersecurity firm FireEye says was hacked by nation state

On Tuesday, acting Defense Secretary Chris Miller told CBS News there was so far
no evidence of compromise.

In the months since the update went out, the hackers carefully exfiltrated data,
often encrypting it so it wasn’t clear what was being taken, and expertly
covering their tracks.

Thomas Rid, a Johns Hopkins cyberconflict expert, said the campaign’s likely
efficacy can be compared to Russia’s three-year 1990s “Moonlight Maze” hacking
of U.S. government targets, including NASA and the Pentagon. A U.S.
investigation determined the height of the documents stolen — if printed out and
piled up — would triple the height of the Washington Monument.

In this case “several Washington Monument piles of documents that they took from
different government agencies is probably a realistic estimate,” Rid said. “How
would they use that? They themselves most likely don’t know yet.”

The Trump administration has not said which agencies were hacked. And so far no
private-sector victims have come forward. Traditionally, defense contractors and
telecommunications companies have been popular targets with state-backed cyber
spies, Rid said.



Intelligence agents generally seek the latest on weapons technologies and
missile defense systems — anything vital to national security. They also develop
dossiers on rival government employees, potentially for recruitment as spies.

President Donald Trump’s national security adviser, Robert O’Brien, cut short an
overseas trip to hold meetings on the hack and was to convene a top-level
interagency meeting later this week, the White House said in a statement.

O’Brien had been scheduled to return Saturday and had to scrap plans to visit
officials in Italy, Germany, Switzerland and Britain, said an official familiar
with his itinerary who was not authorized to discuss it and spoke on condition
of anonymity.

Earlier, the White House said a coordinating team had been created to respond,
including the FBI, the Department of Homeland Security and the Office of the
Director of National Intelligence.

At a briefing for congressional staffers Monday, DHS did not say how many
agencies were hacked, a reflection of how little the Trump administration has
been sharing with Congress on the case.

Critics have long complained that the Trump administration failed to address
snowballing cybersecurity threats — including from ransomware attacks that have
hobbled state and local governments, hospitals and even grammar schools.

“It’s been a frustrating time, the last four years. I mean, nothing has happened
seriously at all in cybersecurity,” said Brandon Valeriano, a Marine Corps
University scholar and adviser to the Cyber Solarium Commission, which was
created by Congress to fortify the nation’s cyber defenses. “It’s tough to find
anything that we moved forward on at all.”

Trump eliminated two key government positions: White House cybersecurity
coordinator and State Department cybersecurity policy chief.

Full Coverage: Hacking

Valeriano said one of the few bright spots was the work of Chris Krebs, the head
of the Cybersecurity and Infrastructure Security Agency, whom Trump fired for
defending the integrity of the election in the face of Trump’s false claims of
widespread fraud.

Hackers infiltrated government agencies by piggybacking malicious code on
commercial network management software from SolarWinds, a Texas company,
beginning in March.

The campaign was discovered by the cybersecurity company FireEye when it
detected it had been hacked — it disclosed the breach Dec. 8 — and alerted the
FBI and other federal agencies. FireEye executive Charles Carmakal said it was
aware of “dozens of incredibly high-value targets” infiltrated by the hackers
and was helping “a number of organizations respond to their intrusions.” He
would not name any, and said he expected many more to learn in coming days that
they, too, were compromised.

Carmakal said the hackers would have activated remote-access back doors only on
targets sure to have prized data. It is manual, demanding work, and moving
networks around risks detection.

The SolarWinds campaign highlights the lack of mandatory minimum security rules
for commercial software used on federal computer networks. Zoom
videoconferencing software is another example. It was approved for use on
federal computer networks last year, yet security experts discovered various
vulnerabilities exploitable by hackers — after federal workers sent home by the
pandemic began using it.

Rep. Jim Langevin, a Rhode Island Democrat and Cyberspace Solarium Commission
member, said the breach reminded him of the 2015 Chinese hack of the U.S. Office
of Personnel Management, in which the records of 22 million federal employees
and government job applicants were stolen.

It highlights the need, he said, for a national cyber director at the White
House, a position subject to Senate confirmation. Congress approved such a
position in a recently passed defense bill.

“In all of the different departments and agencies, cybersecurity is never going
to be their primary mission,” Langevin said.

Trump has threatened to veto the bill over objections to unrelated provisions.

—-

Associated Press writers Ben Fox, Deb Riechmann and Lolita Baldor in Washington
and Matt O’Brien in Providence, Rhode Island, contributed to this report.

PromotedPromoted
Promoted LinksPromoted Links
You May Like
Promoted: Term Life Insurance

Canada Term Life Insurance - $150,000 - 24.97 / MonthPromoted: Term Life
InsuranceGet Quote


Undo
Promoted: Daily Finance Stories

After 13 Years Of Working At CNN, This is Don Lemon's Annual SalaryPromoted:
Daily Finance Stories


Undo
Promoted: Tips and Tricks

Everyone laughed at him when he married her, 6 years later she shows her
metamorphosis Promoted: Tips and Tricks


Undo
Promoted: BuzzAura

Meghan Has To Moves Out Of Her House, Here's WhyPromoted: BuzzAura


Undo
Promoted: Today&#39;s NYC

20+ Beautiful Teachers That You Can't Stop Staring At.Promoted: Today's NYC


Undo
Promoted: Finance Wealth Post

Gwen Stefani, 53, Takes Off Makeup, Leaves Us With No WordsPromoted: Finance
Wealth Post


Undo
by Taboolaby Taboola


    
by Taboola by Taboola 
You May Like

2 Chinese navy ships head to Singapore for joint drills


Undo

CSOonline.comAd Content

Promoted Protecting yourself from DDoS attacksCSOonline.com:
Promoted Promoted 


Undo

Tucker Carlson speaks out for 1st time after Fox News firing


Undo

Curry leads Warriors past Kings 123-116 for 3-2 series lead


Undo

School funding worries lead to late Indiana budget boost


Undo


' ' '
' ' '




Ad Content
Cher's Son Chaz Bono Is So Skinny Now And Looks Like A Model (Photos)Promoted:
Daily Finance Stories
Promoted: Daily Finance Stories




Undo
Montreal: Senior Living For $1000/MonthPromoted: ActiveBeat
Promoted: ActiveBeat




Undo

25 Most Unforgettable Swimsuit Moments In Film HistoryPromoted: PDFwonder
Promoted: PDFwonder



Undo
Plant Banana Peels All Over Your Garden, Look What Happens A Week LaterPromoted:
Tips and Tricks
Promoted: Tips and Tricks



Undo


Ad Content
Promoted: Definition

The Most Hated AthletesPromoted: Definition


Undo
Promoted: Bedtimez

If You See This Bug You Have A Big ProblemPromoted: Bedtimez


Undo
Promoted: ActiveBeat


Dentists Are Almost Giving Away Implants Now (See Offers)Promoted:
ActiveBeatLearn More


Undo

Brittney Griner gets emotional discussing Russian detainmentBrittney Griner got
emotional quickly while speaking to reporters for the first time since her
nearly 10-month detainment in Russia on drug-related charges. The WNBA star had
to take a moment to compose herself after being asked about her resiliency
through the ordeal. Griner’s first news conferenceApril 27, 2023



Undo
Sponsored LinksSponsored Links
Promoted LinksPromoted Links



AP NEWS
 1. Top Stories
 2. Video
 3. Contact Us
 4. Accessibility Statement
 5. Cookie Settings

Download AP NEWS
Connect with the definitive source for global and local news

More from AP
 1. ap.org
 2. AP Insights
 3. AP Definitive Source Blog
 4. AP Images Spotlight
 5. AP Explore
 6. AP Books
 7. AP Stylebook

Follow AP
 1. 
 2. 
 3. 
 4. 


The Associated Press
 1. About
 2. Contact
 3. Customer Support
 4. Careers
 5. Terms & Conditions
 6. Privacy

All contents © copyright 2023 The Associated Press. All rights reserved.


WHY ARE YOU REPORTING THIS AD?

Please make a selection.
Plays sound Contains adult content Covers the page Other


ADDITIONAL INFORMATION

Please help us by describing the ad.
Only 500 characters are allowed.
Report ad

Thank you for letting us know.

Powered by
×



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices