
WASHINGTON (AP) β Top national security agencies confirmed Tuesday that Russia was likely responsible for a massive hack of U.S. government departments and corporations, rejecting President Donald Trump's claim that China might be to blame.
The rare joint statement represented the U.S. government's first formal attempt to assign responsibility for the breaches at multiple agencies and to assign a possible motive for the operation. It said the hacks appeared to be intended for βintelligence gathering," suggesting the evidence so far pointed to a Russian spying effort rather than an attempt to damage or disrupt U.S. government operations.
The agencies made clear the Russian operation was βongoingβ and indicated the hunt for threats was not over.
βThis is a serious compromise that will require a sustained and dedicated effort to remediate,β said the statement, distributed by the FBI, the National Security Agency, the Office of the Director of National Intelligence and the Cybersecurity and Infrastructure Security Agency.
It was not clear why the statement was issued Tuesday, especially since government officials and cybersecurity experts have for weeks believed that Russia was responsible. Even so, the announcement puts the imprimatur of national security agencies, albeit belatedly, on information that members of Congress had clamored for the White House to make public.
The Associated Press reported last month that officials at the White House had been prepared to issue a statement that accused Russia of being the main actor in the hack but were told at the last minute to stand down. The day of that report, Dec. 19, Trump tweeted that the βCyber Hack is far greater in the Fake News Media than in actualityβ and suggested without any evidence that China could be to blame.
Sen. Mark Warner, the Democratic vice chairman of the Senate Intelligence Committee, lamented the belated statement, saying βit's unfortunate that it has taken over three weeks after the revelation of an intrusion this significant for this Administration to finally issue a tentative attribution.β He said he hoped βthat we will begin to see something more definitiveβ as well as a warning to Russia, which has denied involvement in the hack.
With the public finger-pointing taking place in the final two weeks of the Trump administration, it will almost certainly fall to incoming President Joe Biden to decide how to respond to a hacking campaign that amounts to Washingtonβs worst cyberespionage failure to date. Biden has said his administration will impose βsubstantial costsβ on countries responsible for U.S. government hacks, but it is unclear whether the response in this case will involve sanctions, prosecution, offensive cyber operations or some combination of those options.
The hacking campaign was extraordinary in scale, with the intruders having stalked through government agencies, defense contractors and telecommunications companies for months by the time it was discovered. Experts say that gave the foreign agents ample time to collect data that could be highly damaging to U.S. national security, though the scope of the breaches and exactly what information was sought is unknown.
An estimated 18,000 organizations were affected by malicious code that piggybacked on popular network-management software from an Austin, Texas, company called SolarWinds. Of those customers, though, βa much smaller number has been compromised by follow-on activity on their systems,β the statement said, noting that fewer than 10 federal government agencies have so far been identified as falling into that category.
The Treasury and Commerce departments are among the agencies known to have been affected. Sen. Ron Wyden, an Oregon Democrat, said after a briefing last month provided to Senate Finance Committee staff that dozens of Treasury Department email accounts were compromised and that hackers had broken into systems used by the department's highest-ranking officials.
A senior executive of the cybersecurity firm that discovered the malware, FireEye, said last month that βdozens of incredibly high-value targetsβ have been infiltrated by elite, state-backed hackers. The executive, Charles Carmakal, would not name the targets. Nor has Microsoft, which said it identified more than 40 compromised government and private targets, most in the U.S.
Microsoft said in a blog post last week that hackers tied to the intrusions of government agencies and companies sneaked further into its systems than previously thought and were able to view some of the code underlying Microsoft software, but werenβt able to make any changes to it.
The extent of affected targets remains undisclosed.
βI think itβs highly unlikely at this stage of the investigation they can actually be certain that there are only 10 agencies impacted,β said Dmitri Alperovitch, former chief technical officer of the cybersecurity firm CrowdStrike.
Ben Buchanan, a Georgetown University cyberespionage expert, said the fact that multiple investigating agencies are now attributing the hacking campaign to Russia βremoves any remaining serious doubts about the perpetrators.β
As for the number of federal agencies compromised, he said itβs difficult to know βfrom the outside how theyβve evaluated this.β While such assessments are difficult, Buchanan said, he believes the government must have evidence for the claim given the joint nature of the statement.
U.S. officials, including then-Attorney General William Barr and Secretary of State Mike Pompeo, and cybersecurity experts have in recent weeks said that Russia was to blame. But Trump, who throughout his term has resisted blaming Moscow for cyber operations, broke from the consensus within his own administration by tweeting that the media was afraid of "discussing the possibility that it may be China (it may!).β
Tuesday's statement makes clear that is not the case, saying the U.S. investigation reveals that a cyber actor, βlikely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks.β
"At this time, we believe this was, and continues to be, an intelligence gathering effort. We are taking all necessary steps to understand the full scope of this campaign and respond accordingly,β the statement said.