On behalf of President Trump, the four agencies were part of the task force Cyber Unified Coordination Group (UCG) that is coordinating the investigation and remediation of the SolarWinds hack that had a significant impact on federal government networks. The UCG’s investigation is still ongoing to determine the scope of the incident.
According to the UCG’s statement, the attack was orchestrated by an Advanced Persistent Threat (APT) actor, likely Russian in origin.
“This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks.” reads the statement. “At this time, we believe this was, and continues to be, an intelligence gathering effort.”
The UCG confirmed that approximately 18,000 customers of Solar Winds’ Orion product were impacted, but only a smaller number of them have been compromised. The Government experts also identified fewer than ten U.S. government agencies that were impacted.
The statement dismantles President Donald Trump’s claim that the attack was orchestrated by China-linked actors and confirms the report published by the Washington Post that blames the Russia-linked APT29 group.
The Russian Government has denied involvement in the hack.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
(SecurityAffairs – hacking, SolarWinds)