SolarWinds hackers broke into US cable firm, Arizona county - web records

It is not clear what, if any, information was compromised.

Hacker in a hood (photo credit: INGIMAGE)
Hacker in a hood
(photo credit: INGIMAGE)
Suspected Russian hackers accessed the systems of a US internet provider and a county government in Arizona as part of a sprawling cyber-espionage campaign disclosed this week, according to an analysis of publicly-available web records.
The hack, which hijacked ubiquitous network management software made by SolarWinds Corp to compromise a raft of US government agencies and was first reported by Reuters, is one of the biggest ever uncovered and has sent security teams around the world scrambling to contain the damage.
The intrusions into networks at Cox Communications and the local government in Pima County, Arizona, show that alongside victims including the US departments of Defence, State, and Homeland Security, the hackers also spied on less high-profile organizations.
A spokesman for Cox Communications said the company was working "around the clock" with the help of outside security experts to investigate any consequences of the SolarWinds compromise. "The security of the services we provide is a top priority," he said.
In emailed comments sent to Reuters, Pima County Chief Information Officer Dan Hunt said his team had followed US government advice to immediately take SolarWinds software offline after the hack was discovered. He said investigators had not found any evidence of a further breach.
Reuters identified the victims by running a coding script released on Friday by researchers at Moscow-based cybersecurity firm Kaspersky to decrypt online web records left behind by the attackers.
The type of web record, known as a CNAME, includes an encoded unique identifier for each victim and shows which of the thousands of "backdoors" available to them the hackers chose to open, said Kaspersky researcher Igor Kuznetsov.
"Most of the time these backdoors are just sleeping," he said. "But this is when the real hack begins."
The CNAME records relating to Cox Communications and Pima County were included in a list of technical information published by US cybersecurity firm FireEye Inc, which was the first victim to discover and reveal it had been hacked.
John Bambenek, a security researcher and president of Bambenek Consulting, said he had also used the Kaspersky tool to decode the CNAME records published by FireEye and found they connected to Cox Communications and Pima County.
The records show that the backdoors at Cox Communications and Pima County were activated in June and July this year, the peak of the hacking activity so far identified by investigators.
It is not clear what, if any, information was compromised.
SolarWinds, which disclosed its unwitting role at the center of the global hack on Monday, has said that up to 18,000 users of its Orion software downloaded a compromised update containing malicious code planted by the attackers.
As the fallout continued to roil Washington on Thursday, with a breach confirmed at the US Energy Department, US officials warned that the hackers had used other attack methods and urged organizations not to assume they were protected if they didn't use recent versions of the SolarWinds software.
Microsoft, which was one of the thousands of companies to receive the malicious update, said it had currently notified more than 40 customers whose networks were further infiltrated by the hackers.
Around 30 of those customers were in the United States, it said, with the remaining victims found in Canada, Mexico, Belgium, Spain, Britain, Israel and the United Arab Emirates. Most worked information technology companies, as well as some think tanks and government organizations.
"It's certain that the number and location of victims will keep growing," Microsoft President Brad Smith said in a blog post.
"The installation of this malware created an opportunity for the attackers to follow up and pick and choose from among these customers the organizations they wanted to further attack, which it appears they did in a narrower and more focused fashion."
Suspected Russian hackers have compromised only a small number of organizations in Britain after hijacking software updates issued by US IT firm SolarWinds Corp, a UK security source said on Friday.
"Numbers in the UK are small and the organizations are not in the public sector," the source said.