Advertisement
Cybersecurity
WorldUnited States & Canada

Politico | How US agencies’ trust in untested software opened the door to hackers

  • The federal government conducts only cursory security inspections of the software it buys from private companies
  • As investigators race to assess the damage from the hacks, experts and lawmakers are calling for increased scrutiny of the third-party code

Reading Time:6 minutes
Why you can trust SCMP
9
US Secretary of State Mike Pompeo. Photo: AFP via Getty Images / TNS
POLITICO

This story is published in a content partnership with POLITICO. It was originally reported by Eric Geller on politico.com on December 19, 2020.

The massive months-long hack of agencies across the US government succeeded, in part, because no one was looking in the right place.

The federal government conducts only cursory security inspections of the software it buys from private companies for a wide range of activities, from managing databases to operating internal chat applications. That created the blind spot that suspected Russian hackers exploited to breach the Treasury Department, the Department of Homeland Security, the National Institutes of Health and other agencies. After embedding code in widely used network management software made by a Texas company called SolarWinds, all they had to do was wait for the agencies to download routine software updates from the trusted supplier.

Advertisement

As investigators race to assess the damage from the hacks, experts and lawmakers are calling for increased scrutiny of the third-party code that government agencies allow on their networks and demanding a fix for a long-known weakness.

US Congressman Ted Lieu. Photo: EPA-EFE
US Congressman Ted Lieu. Photo: EPA-EFE
Advertisement

“The government desperately needs to set minimum security requirements for software and services, and refuse to buy anything that doesn't meet those standards,” said Senator Ron Wyden. “It is incredibly self-defeating for federal agencies to spend billions on security and then give government contracts to companies with insecure products.”

Over the past week, agencies rushed to scrub the malicious code from their networks while senior officials huddled in emergency meetings – all amid reports of more victims in the federal government, state governments and private industry. As the extent of the attack became clearer, cyber experts warned that cleaning up the mess could take months or years.

Advertisement
Select Voice
Choose your listening speed
Get through articles 2x faster
1.25x
250 WPM
Slow
Average
Fast
1.25x