FireEye, one of the largest cybersecurity companies in the US, said on Tuesday that is had been hacked, possibly by a foreign government.
The hacking lead to the theft of an arsenal of internal hacking tools that the company typically reserves for privately testing the cyber defenses of their own clients.
The hack of FireEye, a company with an array of business contracts across the national security space in the US and among its allies, is among the most significant breaches in recent memory.
The FireEye breach was disclosed in a blogpost authored by its CEO, Kevin Mandia. The post said “red team tools” were stolen as part of a highly sophisticated, probable “nation-state” hacking operation. It is not clear exactly when the hack initially took place.
Beyond the tool theft, the hackers also appeared to be interested in a subset of FireEye customers: government agencies.
“We hope that by sharing the details of our investigation, the entire community will be better equipped to fight and defeat cyber-attacks,” Mandia wrote.
The company itself has partnered in recent weeks with different software makers to share defensive measures.
There is no evidence yet that FireEye’s hacking tools have been used or that client data was exfiltrated. But the investigation, which includes help from the FBI and Microsoft, is in its early phases.
“This incident demonstrates why the security industry must work together to defend against and respond to threats posed by well-funded adversaries using novel and sophisticated attack techniques,” a Microsoft spokesperson said.
The FBI did not immediately respond to a request for comment.
The stolen computer espionage kit targets a myriad of different vulnerabilities in popular software products. It is not yet clear exactly which systems may be affected.
But Mandia wrote that none of the red team tools exploited so-called “zero day vulnerabilities”, meaning the relevant flaws should already be public.
Experts say it can be difficult to measure the impact of a hacking tool leak which focuses on known software vulnerabilities. When a private company becomes aware of a vulnerability in their software product, they often try to offer a “patch” or upgrade that nullifies the issue. Yet users do not always download these patches quickly, leaving themselves exposed for months or weeks.
“We are not sure if the attacker intends to use our Red Team tools or to publicly disclose them,” Mandia wrote.
Mark Warner, the Democratic vice-chairman of the Senate select committee on intelligence, said: “The hack of a premier cybersecurity firm demonstrates that even the most sophisticated companies are vulnerable to cyber-attacks.
“We have come to expect and demand that companies take real steps to secure their systems, but this case also shows the difficulty of stopping determined nation-state hackers. As we have with critical infrastructure, we have to rethink the kind of cyber assistance the government provides to American companies in key sectors on which we all rely.”
Свежие комментарии