After Russian intelligence launched one of the most devastating cyber espionage attacks in history against U.S. government agencies, the Biden administration set up a new board and tasked it to figure out what happened — and tell the public.

State hackers had infiltrated SolarWinds, an American software company that serves the U.S. government and thousands of American companies. The intruders used malicious code and a flaw in a Microsoft product to steal intelligence from the National Nuclear Security Administration, National Institutes of Health and the Treasury Department in what Microsoft President Brad Smith called “the largest and most sophisticated attack the world has ever seen.”

The president issued an executive order establishing the Cyber Safety Review Board in May 2021 and ordered it to start work by reviewing the SolarWinds attack.

But for reasons that experts say remain unclear, that never happened.

Nor did the board probe SolarWinds for its second report.

A full, public accounting of what happened in the Solar Winds case would have been devastating to Microsoft. ProPublica recently revealed that Microsoft had long known about — but refused to address — a flaw used in the hack. The tech company’s failure to act reflected a corporate culture that prioritized profit over security and left the U.S. government vulnerable, a whistleblower said.

  • Brkdncr@lemmy.world
    link
    fedilink
    arrow-up
    5
    arrow-down
    2
    ·
    5 months ago

    Maybe I’m not remembering things right, but the solarwinds attack was a supply chain attack. Their upstream code was manipulated internally which resulted in a downstream malicious dll.

    I’m not sure how that’s MS’s fault.

    • Buelldozer@lemmy.today
      link
      fedilink
      arrow-up
      12
      ·
      5 months ago

      Maybe I’m not remembering things right, but the solarwinds attack was a supply chain attack.

      You aren’t misremembering, that’s what we were all told however the reality was a bit different. MS had been ignoring a serious security vulnerability for years. That vuln was eventually used to breech SolarWinds and then that was leverage to breech everyone else.

      https://www.propublica.org/article/microsoft-solarwinds-what-you-need-to-know-cybersecurity

      • Kairos@lemmy.today
        link
        fedilink
        arrow-up
        3
        ·
        5 months ago

        This thing is so fucking weird to me. Mircosoft argued that it’s the companies fault for being hacked because a user account was compromised? Okay wise guy what about corporate espionage via a planted employee?

    • foggy@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      5 months ago

      Correct.

      And he was caught because his VPN had a lapse in the connection which exposed his actual IP address. It was a disgruntled employee. Not a Russian attack.

      Though the Microsoft attack this year, I believe was Russian in origin.