US Federal Payroll Agency Hacked Using SolarWinds Software Flaw

US Federal Payroll Agency Hacked Using SolarWinds Software Flaw

The FBI has discovered that the National Finance Center (NFC), a U.S. Department of Agriculture (USDA) federal payroll agency, was compromised by exploiting a SolarWinds Orion software flaw, according to a Reuters report.

NFC provides human resources and payroll services to roughly 170 federal agencies and over 650,000 federal employees since 1973.

USDA confirms data breach

The software vulnerability used to break into NFC’s systems is different than the one used by suspected Russian nation-state hackers to compromise the update mechanism of the Orion software to deploy the Sunburst backdoor on SolarWinds customers’ systems.

Even though both the FBI and the USDA declined to provide further comment, the latter confirmed that it had suffered a data breach.

The USDA did, however, provide a statement saying that it “notified all customers (including individuals and organizations) whose data has been affected.”

The threat actors behind the USDA agency hack are suspected to be part of a Chinese-backed hacking group according to Reuters’ sources.

Reuters sources believe the attackers to be based out of China as they utilize infrastructure and tools utilized in previous state-backed Chinese cyberattacks.

Also Read: 15 Best Tools For Your Windows 10 Privacy Settings Setup

Hack exploited flaw used to deploy Supernova backdoor

Although the vulnerability was not named, Reuters reporters said that the suspected Chinese hackers used the same security bug that made it possible for threat actors to deploy the Supernova backdoor on systems where vulnerable versions of the Orion platform had been installed.

“This vulnerability in the Orion Platform has been resolved in the latest updates,” SolarWinds said in an advisory providing information on the Sunburst and Supernova malware.

Organizations that cannot immediately upgrade to these patched versions, can use a script SolarWinds provides in their advisory to temporarily protect their systems against attempts to deploy the malware.

SuperNova was deployed as a DLL file that allowed attackers to remotely send, compile, and execute malicious code on compromised systems.

Supernova backdoor code (Palo Alto Networks)

Compromised US government targets

The list of U.S. government agencies confirmed as having been hit in the SolarWinds supply-chain attack includes:

Also Read: Going Beyond DPO Meaning: Ever Heard of Outsourced DPO?

Earlier this month, the Administrative Office of the U.S. Courts has also disclosed an ongoing investigation of a potential compromise of the federal courts’ case management and electronic case files system.

Privacy Ninja

Recent Posts

Role of Enhanced Access Controls in Safeguarding Personal Data in Telecommunications

Role of Enhanced Access Controls in Safeguarding Personal Data in Telecommunications that every Organisation in…

2 weeks ago

Role of Effective Incident Response Procedures in Strengthening Data Security

Effective Incident Response Procedures in Strengthening Data Security that every Organisation in Singapore should know…

2 weeks ago

Strengthening Your Cyber Defenses: The Crucial Role of Regular Vulnerability Scanning

Crucial Role of Regular Vulnerability Scanning that every Organisation in Singapore should know. Strengthening Your…

2 weeks ago

Enhancing Data Security with Multi-Factor Authentication

Enhancing Data Security with Multi-Factor Authentication that every Organisation in Singapore should know. Enhancing Data…

3 weeks ago

A Strong Password Policy: Your Organization’s First Line of Defense Against Data Breaches

Strong Password Policy as a first line of defense against data breaches for Organisations in…

3 weeks ago

Enhancing Website Security: The Importance of Efficient Access Controls

Importance of Efficient Access Controls that every Organisation in Singapore should take note of. Enhancing…

4 weeks ago