EletiofeRussia's FireEye Hack Is a Statement—but Not a Catastrophe

Russia’s FireEye Hack Is a Statement—but Not a Catastrophe

-

- Advertisment -

FireEye has built its reputation on defending high-stakes clients from hackers. Today, the cybersecurity firm acknowledged that it had itself been the victim of a breach—and that the attackers made off with some of its offensive tools. It’s a startling admission but almost certainly not as devastating as it may first sound.

Like many cybersecurity companies, FireEye uses its “red team” tools to mimic those used in real attacks and look for vulnerabilities in its customers’ digital systems the way real adversaries would. The firm is able to update and refine its methods because it encounters and studies real nation-state and criminal hacking tools while assisting customers with incident response. But that’s still a far cry from investing to develop a novel offensive arsenal—and not nearly as scary as the tools at the disposal of, say, the National Security Agency.

FireEye CEO Kevin Mandia said in a blog post today that the company has been dealing with the fallout of “an attack by a nation with top-tier offensive capabilities” and has engaged the help of the Federal Bureau of Investigation along with industry peers like Microsoft. The Washington Post reported on Tuesday that hackers from a group known as APT 29 or Cozy Bear, attributed to Russia’s SVR foreign intelligence service, carried out the breach.

FireEye has both global prominence and a history of engaging with Russian actors. The company was the first, for instance, to tie the hacker group known as Sandworm—responsible for blackouts in Ukraine in 2015 and 2016 as well as the hyperdestructive worm NotPetya the following year—to Unit 74455 of Russia’s GRU military intelligence agency. FireEye also provided the first public evidence that the same GRU unit was responsible for the attempted sabotage of the 2018 Winter Olympics. All of those attacks were later named in a US indictment of six Sandworm hackers unsealed in October.

The apparently retaliatory hack sends a clear statement that while Russia may have been relatively quiet during the US presidential election, the Kremlin’s digital prowess remains formidable. At the same time, the fallout from the hack doesn’t compare to the release of tools like the NSA’s Eternal Blue tool, which a mysterious group called the Shadow Brokers leaked in 2017, or the breach of exploit broker Hacking Team in 2015.

“The most important data that a company like FireEye has is data about its customers. The second most important data they have are the sources and methods they use to protect their customers,” like threat intelligence data, says Richard Bejtlich, former chief security officer of Mandiant, the incident response division of FireEye, and principal security strategist at the network analysis firm Corelight. “Farther down the line are the red team tools, where they’re emulating adversaries.”

FireEye said on Tuesday that none of the stolen red team tools utilize so-called zero-day exploits—mechanisms that weaponize secret, unpatched software vulnerabilities, which makes them especially dangerous. Nonetheless, Russia could use the tools itself, share them with others, or leak them publicly. The company said it does not yet fully understand the hackers’ plans or motives, though they primarily focused their attack on information related to some of FireEye’s government clients.

Mandia emphasized repeatedly that FireEye is offering more than 300 “countermeasures” meant to make it more difficult for Russia to use the stolen hacking tools effectively. The company has incorporated these digital antidotes, essentially detection mechanisms and blocking tools, into its own security products, has shared them with other firms, and has released them publicly.

Making these defenses widely available would make a big difference if Russia were to dump the trove of tools publicly, says Dave Aitel, a former NSA hacker. “Very few teams have detections ready to go if their stuff leaks, so that part of it at least is very impressive,” Aitel says.

The stolen tools likely won’t give Russia much it doesn’t already have for its own hacking campaigns, says Jake Williams, a former NSA hacker and founder of the security firm Rendition Infosec. But Williams points out that Russia may feel emboldened to leak the stolen goods publicly, given US Cyber Command’s more aggressive approach recently to naming and shaming actors and their hacking tools. At the end of October, for example, Cyber Command publicly released details about a malware dropper it attributed to Russia’s APT 28, likely for use in attacks on ministries of foreign affairs and other government bodies.

Still, in practice the threat from the tools is important but likely not ruinous.

“The only reason you should care about this as it stands now is if Russia was part of your threat model already, if they were going to attack you anyway. Then you need to have the detections for these tools ready just in case,” Rendition Infosec’s Williams says. “But if Russia releases the tools publicly, now it’s in everyone’s threat model. So that’s the game changer.”

Williams agrees, though, that FireEye’s head start on distributing defense tools makes it more likely that if Russia dumps the tools at all it would be as a sort of victory lap and statement to the US government rather than as a specific effort to wreak havoc.

“I’m pretty upset about this,” says Corelight’s Bejtlich, “but it’s not at the level of having a whole bunch of zero-days we’re going to have to deal with.”

Additional reporting by Andy Greenberg.


More Great WIRED Stories

Latest news

Oregon’s Breakthrough Right-to-Repair Bill Is Now Law

Oregon governor Tina Kotek yesterday signed the state's Right to Repair Act, which will push manufacturers to provide more...

USWNT’s Korbin Albert apologizes after Megan Rapinoe calls out anti-LGBTQ social media content

Rapinoe's farewell game was a brutal ending to an accomplished and impactful career. The midfielder left the field in...

Bug Zappers Are Swarming on Amazon

Call it a bug zapper, not a feature.Data from Fakespot, a service owned by Mozilla that helps consumers spot...

The 30 Best Shows on Max (aka HBO Max) Right Now

It may not have the shine it once did, but Max (previously HBO Max) is still home to some...
- Advertisement -

FTX Founder Sam Bankman-Fried Sentenced to 25 Years in Prison

A US federal judge in the Southern District of New York has sentenced Sam Bankman-Fried, founder of bankrupt crypto...

Obasanjo Visits Family Of Late Olubadan, Lekan Balogun

Ex-President, Olusegun Obasanjo, paid a condolence visit to the bereaved family of the late Olubadan of Ibadanland, Oba Lekan...

Must read

Oregon’s Breakthrough Right-to-Repair Bill Is Now Law

Oregon governor Tina Kotek yesterday signed the state's Right...
- Advertisement -

You might also likeRELATED
Recommended to you