Skip to content
GIVING DAY is April 11! But you can support CSSH students and programs now with a $5+ gift to any of our funds.
Apply
Stories

What are the Russian hackers searching for this time?

People in this story

Photo by Matthew Modoono/Northeastern University
Scenes at the Colosseum which is operated by the Institute for the Wireless Internet of Things (W-IoT) at Northeastern University, and housed at the Northeastern Innovation Campus in Burlington, Massachusetts on Nov. 11, 2020.

The depth of the latest Russian hack into the e-mail systems of the Treasury Department, State Department, and other U.S. government agencies is stunning, but the strategy of manipulating a third party to infiltrate computer networks is not, according to Engin Kirda, a professor of computer science at Northeastern who studies computer security.

“It highlights the problem of I.T. outsourcing and also relying on other people’s software to manage your networks,” says Kirda, who holds joint appointments in Northeastern’s Khoury College of Computer Sciences and College of Engineering. “Outsourcing and having professional management software is great, but then your security also depends on their security. If they fail, the implications of this failure might affect thousands of organizations.”

The hackers are believed to have injected malicious code earlier this year into the software updates of SolarWinds, a Texas company that helps manage computer networks for virtually all of the Fortune 500 companies and a wide variety of government clients—including Los Alamos National Laboratory, a designer of U.S. nuclear weapons.

The coordinated attack, which appears to have been waged on a number of fronts, was far more sophisticated than the typical spear-phishing campaigns that trick users into accessing links that appear to be authentic.

Though 18,000 users unwittingly downloaded the updates with the embedded Russian code, the hacks focused mainly on “the highest-value targets,” according to FireEye, a private cybersecurity firm that discovered the attacks. (FireEye itself was targeted and compromised as well.) The precise goals of the hackers, who are thought to represent the Russian intelligence agency S.V.R., remain unknown.

Continue reading at News@Northeastern.

More Stories

image of professor ronald sandler speaking in front of crowd at john d o'bryant institute

Is it ethical to bioengineer plants and animals to stop or reverse extinction? Questions raised during 60th annual Klein Lecture

03.26.2024
Three people hold hands together under sunlight. Image comes with text: Interest in polyamory has taken the media by storm in recent weeks. Data shows that acceptance of non-traditional family structures is on the rise. Photo by Getty Images

 If polyamory is on the rise, there may be good economic reasons. But economist says arrangements are ‘tricky.’

03.18.2024
Image of first responder outside the venue of the attack in the Crocus City Hall concert hall in Moscow, Russia; ISIS-K claimed responsibility for the attack.

Following Moscow attack, terrorism expert says ‘it’s only a matter of time’ before terrorists strike the US again

03.27.24
All Stories