SolarWinds Hackers Had Access To Over 3,000 US DOJ Email Accounts

SolarWinds Hackers Had Access To Over 3,000 US DOJ Email Accounts

The US Department of Justice (DoJ) said that the attackers behind the SolarWinds supply chain attack have gained access to roughly 3% of the department’s Office 365 email inboxes.

The Justice Department currently employs over 115,000 people [12] which translates to around 3450 potentially breached mailboxes.

DoJ’s Office of the Chief Information Officer (OCIO) detected malicious activity on December 24th, 2020, related to the SolarWinds hack that impacted several federal agencies and technology contractors.

“This activity involved access to the Department’s Microsoft O365 email environment,” DoJ Spokesman Marc Raimondi said in a statement published earlier today.

The OCIO blocked the method used by the attackers to gain access to the DOJ Office 365 email accounts after learning of this malicious activity.

“At this point, the number of potentially accessed O365 mailboxes appears limited to around 3-percent and we have no indication that any classified systems were impacted,” Raimondi added.

Also Read: What Is A Governance Framework? The Importance And How It Works

As part of the ongoing technical analysis, the department has determined that the activity constitutes a major incident under the Federal Information Security Modernization Act, and is taking the steps consistent with that determination. The Department will continue to notify the appropriate federal agencies, Congress, and the public as warranted.

— Marc Raimondi

This statement confirms a Microsoft report saying that the end goal of the SolarWinds supply chain compromise was to provide the attackers with access to the targets’ cloud assets after deploying the Sunburst/Solorigate backdoor on their local networks.

Yesterday, a joint FBI, CISA, NSA, and ODNI statement also said that a Russian-backed Advanced Persistent Threat (APT) group is likely behind the SolarWinds attacks.

It also added that only 10 US government agencies have been targeted by additional hacking activity after the initial breach.

“This is a serious compromise that will require a sustained and dedicated effort to remediate,” the federal agencies added.

The compromise of multiple US federal networks was first acknowledged officially in a separate joint statement released on December 17, 2020.

Also Read: Website Ownership Laws: Your Rights And What These Protect

The list of compromised US agencies includes the US Treasury, the US Department of State, US NTIA, US NIH, DHS-CISA, the Department of Energy, the National Nuclear Security Administration, and the US Department of Homeland Security.

Privacy Ninja

Recent Posts

Role of Enhanced Access Controls in Safeguarding Personal Data in Telecommunications

Role of Enhanced Access Controls in Safeguarding Personal Data in Telecommunications that every Organisation in…

1 week ago

Role of Effective Incident Response Procedures in Strengthening Data Security

Effective Incident Response Procedures in Strengthening Data Security that every Organisation in Singapore should know…

2 weeks ago

Strengthening Your Cyber Defenses: The Crucial Role of Regular Vulnerability Scanning

Crucial Role of Regular Vulnerability Scanning that every Organisation in Singapore should know. Strengthening Your…

2 weeks ago

Enhancing Data Security with Multi-Factor Authentication

Enhancing Data Security with Multi-Factor Authentication that every Organisation in Singapore should know. Enhancing Data…

3 weeks ago

A Strong Password Policy: Your Organization’s First Line of Defense Against Data Breaches

Strong Password Policy as a first line of defense against data breaches for Organisations in…

3 weeks ago

Enhancing Website Security: The Importance of Efficient Access Controls

Importance of Efficient Access Controls that every Organisation in Singapore should take note of. Enhancing…

4 weeks ago