Hackers working for China have successfully compromised US government systems, according to a federal cybersecurity agency
- Hackers linked to the Chinese government have successfully infiltrated US government systems across "many sectors," according to the
Cybersecurityand Infrastructure Security Agency and the FBI.
- The hackers are taking advantage of publicly available code and exploits that have already been publicized in order to hack into US entities.
- The report suggests that, after vulnerabilities are discovered and publicized by US defenders, hackers are often able to exploit the vulnerabilities before government agencies patch them.
- CISA did not specify which agencies were compromised or how many records were potentially stolen, but says that hackers were frequently successful using "low-complexity" methods.
Hackers linked to the Chinese government have repeatedly attempted to compromise US government systems over the past year — and in some cases, they were successful, according to the Cybersecurity and Infrastructure Security Agency, the Department of Homeland Security's cybersecurity division.
In an advisory published with the FBI this week, CISA warned that Chinese hackers appeared to be using publicly available information about vulnerabilities that security researchers had discovered — but that hadn't yet been patched — in order to target US entities."CISA has observed the threat actors using a variety of open-source and publicly available exploits and exploit code to compromise Federal Government networks," the agencies said in the advisory.Advertisement
US intelligence agencies have warned of attacks originating from
The advisory doesn't say which agencies were targeted, nor does it disclose the number of records that were potentially stolen. But it outlines how hackers have successfully targeted the US in the past year using "low-complexity" tactics.Those tactics included sending malicious links in phishing emails to US officials, buying domain names to pose as trustworthy organizations, and buying passwords leaked in other breaches to try and compromise officials' accounts.
Hackers also regularly exploited vulnerabilities that security researchers had previously identified and publicized. One of the resources that hackers are using is a database of known vulnerabilities compiled by the National Institute of Standards and Technology."CISA analysts have observed a correlation between the public release of a vulnerability and targeted scanning of systems identified as being vulnerable," the advisory reads. The findings suggest that US agencies need to work more quickly to patch vulnerabilities that have been publicly documented. In one case, hackers used an exploit to target US systems weeks after the exploit was publicly disclosed.Advertisement
"CISA and the FBI recommend that organizations place an increased priority on patching the vulnerabilities routinely exploited," the advisory reads. "CISA and the FBI also recommend that organizations routinely audit their configuration and patch management programs to ensure they can track and mitigate emerging threats."
- HM commanders channelised drug smuggling money in J&K to support terror activities: NIA
- What is gender lens investing? Sangita Reddy, Kiran Mazumdar Shaw, Nandini Piramal, and Vani Kola share their thoughts
- Luxury icons Sabyasachi and Oberoi open up about their 'perfectionist quirks' like checking the color of egg yolks and slashing clothes so they can’t hit the edit table
- Indian Prime Minister Narendra Modi warns against complacency in the fight against COVID-19
- Best budget smartphone deals under ₹20,000 in the Amazon Great Indian Festival Sale 2020