FireEye offices in Milpitas, California in 2015. The cybersecurity firm said on Dec 8 that it was hacked by what it believes was a national government. — Ben Margot/AP BOSTON: Prominent US cybersecurity firm FireEye said on Dec 8 that foreign government hackers with "world-class capabilities” broke into its network and stole offensive tools it uses to probe the defenses of its thousands of customers, who include federal, state and local governments and top global corporations. The hackers "primarily sought information related to certain government customers,” FireEye CEO Kevin Mandia said in a statement, without naming them. He said there was no indication they got customer information from the company's consulting or breach-response businesses or threat-intelligence data it collects. FireEye is a major cybersecurity player – it responded to the Sony and Equifax data breaches and helped Saudi Arabia thwart an oil industry cyberattack – and has played a key role in identifying Russia as the protagonist in numerous aggressions in the burgeoning netherworld of global digital conflict. Neither Mandia nor a FireEye spokeswoman said when the company detected the hack or who might be responsible. But many in the cybersecurity community suspect Russia. "I do think what we know of the operation is consistent with a Russian state actor," said former NSA hacker Jake Williams, president of Rendition Infosec. "Whether or not customer data was accessed, it’s still a big win for Russia.” FireEye's Mandia said he had concluded that "a nation with top-tier offensive capabilities” was behind the attack. The stolen "red team” tools – which amount to real-world malware – could be dangerous in the wrong hands. FireEye said there’s no indication they have been used maliciously. But cybersecurity experts say sophisticated nation-state hackers could modify them and wield them in the future against government or industry targets. The hack was the biggest blow to the US cybersecurity community since a mysterious group known as the "Shadow Brokers” in 2016 released a trove of high-level hacking tools stolen from the US National Security Agency. The United States believes North Korea and Russia capitalised on the stolen tools to unleash devastating global cyberattacks. The nation’s Cybersecurity and Infrastructure Security Agency warned that "unauthorised third-party users” could similarly abuse FireEye’s stolen red-team tools. Milpitas, California-based FireEye, which is publicly traded, said in Dec 8’s statement that it had developed 300 countermeasures to protect customers and others from them and was making them immediately available. FireEye has been at the forefront of investigating state-backed hacking groups, including Russian groups trying to break into state and local governments in the United States that administer elections. It was credited with attributing to Russian military hackers mid-winter attacks in 2015 and 2016 on Ukraine’s energy grid. Its threat hunters also have helped social media companies including Facebook identify malicious actors. Thomas Rid, a Johns Hopkins cyberconflict scholar, said that if the Kremlin were behind the hack, it could have been seeking to learn what FireEye knows about Russia’s global state-backed operations – doing counterintelligence. Or it might have seeking to retaliate against the US government for measures including indicting Russian military hackers for meddling in the 2016 US election and other alleged crimes. FireEye is, after all, a close US government partner that has "exposed many Russian operations," he said. FireEye said it is investigating the attack in coordination with the FBI and partners including Microsoft, which has its own cybersecurity team. Mandia said the hackers used "a novel combination of techniques not witnessed by us or our partners in the past.” Matt Gorham, assistant director of the FBI's cyber division, said the hackers' "high level of sophistication (was) consistent with a nation state.” The US government is "focused on imposing risk and consequences on malicious cyber actors, so they think twice before attempting an intrusion in the first place,” Gorham said. That has included what US Cyber Command terms "defending forward” operations such as penetrated the networks of Russia and other adversaries. US Senator Mark Warner, a Virginia Democrat on the Senate’s intelligence committee, applauded FireEye for quickly disclosing the intrusion, saying the case "shows the difficulty of stopping determined nation-state hackers.” Cybersecurity expert Dmitri Alperovitch said security companies like FireEye are top targets, with big names in the field including Kaspersky and Symantec breached in the past. "Every security company is being targeted by nation-state actors. This has been going on over a decade now,” said Alperovitch, the co-founder and former chief technical officer of Crowdstrike, which investigated the 2016 Russian hack of the Democratic National Committee and Hillary Clinton's campaign. He said the release of the "red-team” tools, while a serious concern, was "not the end of the world because threat actors always create new tools.” "This could have been much worse if their customer data had been hacked and exfiltrated. So far there is no evidence of that,” Alperovitch said, citing hacks of other cybersecurity companies – RSA Security in 2011 and Bit9 two years later – that contributed to the compromise of customer data. Founded in 2004, FireEye went public in 2013 and months later acquired Virginia-based Mandiant Corp, the firm that linked years of cyberattacks against US companies to a secret Chinese military unit. It had about 3,400 employees and US$889.2mil in revenue last year, though with a net loss of US$257.4mil. The company's 8,800 customers last year included more than half of the Forbes Global 2000, companies in telecommunications, technology, financial services, healthcare, electric grid operators, pharmaceutical companies and the oil-and-gas industry. Its stock fell more than 7% in after-hours trading on Dec 8 following news of the hack. Associated Press writer Eric Tucker contributed to this report. – AP
buyappleacc.com is a professional website selling Apple Developer account for more than 3 years, choose us, provide you with the best Apple Developer account. Don't hassle, just step out.