icon bookmark-bicon bookmarkicon cameraicon checkicon chevron downicon chevron lefticon chevron righticon chevron upicon closeicon v-compressicon downloadicon editicon v-expandicon fbicon fileicon filtericon flag ruicon full chevron downicon full chevron lefticon full chevron righticon full chevron upicon gpicon insicon mailicon moveicon-musicicon mutedicon nomutedicon okicon v-pauseicon v-playicon searchicon shareicon sign inicon sign upicon stepbackicon stepforicon swipe downicon tagicon tagsicon tgicon trashicon twicon vkicon yticon wticon fm

Pentagon ‘assessing systems’ after TENS OF THOUSANDS of servers compromised in global Microsoft hack… blamed on ‘Chinese hackers’

Pentagon ‘assessing systems’ after TENS OF THOUSANDS of servers compromised in global Microsoft hack… blamed on ‘Chinese hackers’
The US military is reviewing its networks following a hacking spree linked to a vulnerability that gave backdoor access to tens of thousands of Microsoft Exchange servers, in a massive attack the company has blamed on China.

“We are aware of the Microsoft threat intelligence center’s report. We are currently assessing our networks right now for any evidence of impact,” Pentagon press secretary John Kirby told reporters at a Friday presser. “We’re also taking all necessary steps to identify and remedy any possible issues related to the situation.”

Joint Force headquarters… is coordinating with the National Security Agency and the Cybersecurity and Infrastructure Security Agency on guidance and directives to make sure we can protect DoD networks and IT systems.

Also on rt.com Mafia-type gangs, not foreign powers, hacked French hospitals, says minister, as some doctors continue to work with pen and paper

Microsoft announced the massive cyber breach on its Exchange email platform earlier this week, noting a vulnerability in its servers had given “long-term access” to hackers while attributing the attack to a group named Hafnium – an allegedly “state-sponsored” outfit operating out of China – with “high confidence.” While the company has since released patches to plug the vulnerability, White House press secretary Jen Psaki warned on Friday that future attacks remain an “active threat.”

“This is a significant vulnerability that could have far-reaching impacts. First and foremost, this is an active threat,” Psaki said at a daily press briefing. “We are concerned there are a large number of victims and we are working with our partners to understand the scope of this.”

US National Security Advisor Jake Sullivan meanwhile warned in a tweet of “potential compromises” not only for American think tanks and other orgs, but for “defense industrial base entities,” though he declined to offer details.

Cybersecurity analyst Brian Krebs estimated the breach affected up to 30,000 organizations across the US, including “a significant number of small businesses, towns, cities and local governments.” He also said the black-hat group may have infiltrated “hundreds of thousands” of Exchange servers worldwide, citing two anonymous hacking experts who briefed US national security officials on the attack. A Thursday blog post by FireEye, meanwhile, said “US-based retailers, local governments, a university, and an engineering firm” were also swept up in the hack.

The breach appears to have impacted entities well beyond the US, with a Czech government cybersecurity agency stating this week that it is helping affected organizations in the country to secure their networks, while FireEye suggested “a Southeast Asian government and Central Asian telecom” were hit as well.

Also on rt.com CYBERWAR is imminent & will affect ordinary Americans, claims CEO of company that ‘discovered’ SolarWinds hack

Like this story? Share it with a friend!

Dear readers and commenters,

We have implemented a new engine for our comment section. We hope the transition goes smoothly for all of you. Unfortunately, the comments made before the change have been lost due to a technical problem. We are working on restoring them, and hoping to see you fill up the comment section with new ones. You should still be able to log in to comment using your social-media profiles, but if you signed up under an RT profile before, you are invited to create a new profile with the new commenting system.

Sorry for the inconvenience, and looking forward to your future comments,

RT Team.

Podcasts