"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2020-12-16T14:34:02Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2020/12/16/us-government-hack-solarwinds.cnnbusiness"
data-branding-key=""
data-video-slug="us government hack solarwinds"
data-first-publish-slug="us government hack solarwinds"
data-video-tags="continents and regions,crime, law enforcement and corrections,criminal offenses,digital crime,digital security,eastern europe,europe,government and public administration,government bodies and offices,government organizations - us,politics,russia,technology,us federal departments and agencies,us federal government"
data-details="">
Video Ad Feedback
US government agencies breached by Russian-linked hackers
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2020-12-16T14:34:02Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2020/12/16/us-government-hack-solarwinds.cnnbusiness"
data-branding-key=""
data-video-slug="us government hack solarwinds"
data-first-publish-slug="us government hack solarwinds"
data-video-tags="continents and regions,crime, law enforcement and corrections,criminal offenses,digital crime,digital security,eastern europe,europe,government and public administration,government bodies and offices,government organizations - us,politics,russia,technology,us federal departments and agencies,us federal government"
data-details="">
Video Ad Feedback
US government agencies breached by Russian-linked hackers
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-05-30T19:56:54Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2023/05/30/artificial-intelligence-pose-risk-of-extinction-humanity-salin-sot-nc-vpx.cnn"
data-branding-key=""
data-video-slug="DO NOT USE artificial intelligence pose risk of extinction humanity salin sot nc vpx"
data-first-publish-slug="DO NOT USE artificial intelligence pose risk of extinction humanity salin sot nc vpx"
data-video-tags=""
data-details="">
Video Ad Feedback
Experts warn AI could pose 'extinction' risk for humanity
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-02-14T10:58:28Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2023/02/14/flirt-artificial-intelligence-ai-dating-apps-hinge-tinder-orig.cnn-business"
data-branding-key="nightcap"
data-video-slug="flirt artificial intelligence ai dating apps hinge tinder orig"
data-first-publish-slug="flirt artificial intelligence ai dating apps hinge tinder orig"
data-video-tags="artificial intelligence,business and industry sectors,business, economy and trade,cnn,companies,computer science and information technology,domestic alerts,domestic-business,domestic-health and science,iab-artificial intelligence,iab-business and finance,iab-computing,iab-industries,iab-software and applications,iab-technology & computing,iab-technology industry,international alerts,international-business,international-health and science,mobile apps,mobile technology,openai,software and applications,technology,warnermedia"
data-details="">
Video Ad Feedback
CNN tried an AI flirt app. It was shockingly pervy
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-02-11T02:28:49Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2023/02/11/deepfake-newscast-ai-chinese-messaging-wang-pkg-ac360-vpx.cnn"
data-branding-key=""
data-video-slug="deepfake newscast AI chinese messaging wang pkg ac360 vpx"
data-first-publish-slug="deepfake newscast AI chinese messaging wang pkg ac360 vpx"
data-video-tags=""
data-details="">
Video Ad Feedback
These newscasters you may have seen online are not real people
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-01-28T11:20:56Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2023/01/26/nightcap-chatgpt-students-clip-orig-nb.cnn"
data-branding-key="nightcap"
data-video-slug="nightcap chatgpt students clip orig nb"
data-first-publish-slug="nightcap chatgpt students clip orig nb"
data-video-tags="artificial intelligence,business and industry sectors,business, economy and trade,companies,computer science and information technology,domestic alerts,domestic-business,domestic-health and science,education,education systems and institutions,iab-artificial intelligence,iab-business and finance,iab-computing,iab-education,iab-education industry,iab-industries,iab-technology & computing,iab-technology industry,international alerts,international-business,international-health and science,openai,primary and secondary education,teachers and teaching,technology"
data-details="">
Video Ad Feedback
Hear why this teacher says schools should embrace ChatGPT, not ban it
"
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-01-24T14:05:56Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2023/01/24/what-is-chatgpt-cnntm-pkg-yurkevich-contd-vpx.cnn"
data-branding-key=""
data-video-slug="what is chatgpt cnntm pkg yurkevich contd vpx"
data-first-publish-slug="what is chatgpt cnntm pkg yurkevich contd vpx"
data-video-tags="artificial intelligence,business and industry sectors,business, economy and trade,companies,computer science and information technology,domestic alerts,domestic-business,domestic-health and science,iab-artificial intelligence,iab-business and finance,iab-computing,iab-industries,iab-technology & computing,iab-technology industry,international alerts,international-business,international-health and science,openai,technology"
data-details="">
Video Ad Feedback
He loves artificial intelligence. Hear why he is issuing a warning about ChatGPT
The US government is reeling from multiple data breaches at top federal agencies, the result of a worldwide hacking campaign with possible ties to Russia. Investigators are still trying to figure out how much of the government may have been affected and how badly it may have been compromised.
But what little we know has cybersecurity experts extremely worried — with some describing the attack as a literal wakeup call.
“I woke up in the middle of the night last night just sick to my stomach,” said Theresa Payton, who served as White House Chief Information Officer under President George W. Bush. “On a scale of 1 to 10, I’m at a 9 — and it’s not because of what I know; it’s because of what we still don’t know.”
On Sunday evening, the Commerce Department acknowledged it had been hit by a data breach after Reuters first reported that sophisticated hackers compromised the agency through a third-party software vendor known as SolarWinds. While SolarWinds is not a household name, it works with many businesses and organizations that are.
Since then, more details have emerged suggesting a much wider pattern of compromise. As many as 18,000 SolarWinds customers — out of a total of 300,000 — may have been running software containing the vulnerability that allowed the hackers to penetrate the Commerce Department, the company disclosed in an investor filing this week.
Here’s why the cyberattacks disclosed this week are keeping experts up at night — based on who was targeted, the suspected identities of the attackers and their playbook, according to analysts contacted by CNN Business and published security reports.
All federal agencies on alert
One reason the attack is so concerning is because of who may have been victimized by the spying campaign.
At least two US agencies have publicly confirmed they were compromised: The Department of Commerce and the Agriculture Department. The Department of Homeland Security’s cyber arm was also compromised, CNN previously reported.
But the range of potential victims is much, much larger, raising the troubling prospect that the US military, the White House or public health agencies responding to the pandemic may have been targeted by the foreign spying, too. The Justice Department, the National Security Agency and even the US Postal Service have all been cited by security experts as potentially vulnerable.
All federal civilian agencies have been told to review their systems in an emergency directive by DHS officials. It’s only the fifth such directive to be issued by the Cybersecurity and Infrastructure Security Agency since it was created in 2015.
It isn’t just the US government in the crosshairs: The elite cybersecurity firm FireEye, which itself was a victim of the attack, said companies across the broader economy were vulnerable to the spying, too. The software vulnerability that enabled the spying has been found in the tech and telecom industry, as well as at consulting firms and energy companies, according to FireEye.
Security experts say this is merely the beginning. In the coming days, we may learn that many more companies and agencies have been compromised than we initially suspected. And we still don’t know what information may have been lost or stolen.
Extraordinarily skilled attackers
Another reason to worry is that the attackers appear to have been extraordinarily skilled and determined.
“The campaign demonstrates top-tier operational tradecraft and resourcing consistent with state-sponsored threat actors,” FireEye said, adding that the breaches appear to date as far back as the spring. “Each of the attacks require meticulous planning and manual interaction.”
Attributing any cyberattack is hard under the best of circumstances and even more challenging when a sophisticated actor works to cover their tracks, as these did. But US officials have tentatively said that the culprit may have links to Russia.
That agents of a foreign government may have been responsible for the breaches is a worrisome sign of not only the attackers’ capabilities, but also their motives. These weren’t opportunistic cybercriminals indiscriminately probing whatever targets they could find in hopes of extorting their victims for a quick payday. These were highly motivated attackers who selected each of their victims for a specific purpose that remains unknown.
“If you compromise somebody’s network for 6 months, there’s a lot of opportunity,” said James Lewis, a cybersecurity expert at the Center for Strategic and International Studies, a security think tank. “It’s an amazing coup for the Russians — really impressive.”
An unusual and creative hack
A third reason for concern is the unusual and creative way the attackers carried out their operation: By disguising the initial attack within legitimate software updates issued by SolarWinds.
“SolarWinds is one of the most widely used and effective tools for network monitoring, including across federal networks and major corporations,” said Jamie Barnett, a retired Navy rear admiral and senior vice president at the cybersecurity firm RigNet. “It takes a state-level cyberattack to get into the SolarWinds updates and patches.”
By piggybacking on otherwise trusted software updates, the attackers cleverly took advantage of the normal and recommended best practice of keeping software up to date. Thousands of companies and government agencies could thus have been exposed simply for doing the right thing.
That’s what’s so scary: It’s not clear what could have been done differently in this case, because the very process meant to reassure users that “this software can be trusted” was itself compromised.
Once inside a target, the attackers waited patiently until they collected enough data on authorized users to impersonate them, allowing the hackers to move through a victim’s network undetected for months, according to an analysis by the cybersecurity firm CrowdStrike.
The degree of access the hackers enjoyed, as well as the length of time they were able to collect information, may wind up making this “a much worse cyberattack than the Office of Personnel Management breach” disclosed by the US government in 2015, said Barnett. That breach, attributed to Chinese-linked hackers, resulted in the theft of vast troves of personal data on millions of federal employees and security clearance applicants.
The rising frequency and intensity of state-sponsored hacking has some security cybersecurity leaders reiterating calls for a global treaty on cyberwarfare.
“We need a set of binding rules,” Microsoft president Brad Smith said at an event Tuesday held by the Ronald Reagan Foundation and Institute. “And we need a commitment by the democracies of the world to hold authoritarian regimes accountable, so they keep their hands off of civilians in this time of peace when it comes to cyberspace.”
Other experts are increasingly questioning the reliance of many businesses on just a handful of third-party vendors, and saying that perhaps society makes it a little too easy for data to be accessed or shared, particularly during a pandemic when working remotely is normal for countless individuals.
“It begs the question: ‘In cybersecurity, do we have a ‘too big to fail’ situation? And did it happen right under our noses, while we were telling everybody to spend more, to tool up, to get products?” said Payton.