More aftermath updates now as a result of the SolarWinds cyberattack.
The FBI, CISA, ODNI, and NSA joined together to create a new task force, the Cyber Unified Coordination Group (UCG).
This group formed to coordinate an investigation into the SolarWinds breach. It also offered new context this week on the extent of the breach, the nation-state evidence, and a possible motive.
The Unified Command Group (UCG) confirms that of the 18,000 public and private sector customers of SolarWinds Orion product, a relatively small have been compromised by follow-on activity on their systems. The UCG also confirmed that "less than 10 US government agencies" have been affected by this follow-on activity.
The Unified Coordination Group is continuing to point the finger of attribution at Russia. Here is the latest from a new UCG joint statement:
"This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks. At this time, we believe this was, and continues to be, an intelligence gathering effort. We are taking all necessary steps to understand the full scope of this campaign and respond accordingly."
The SolarWinds supply chain attack was discovered just days before the Christmas holiday in the U.S., but according to the UCG, IT and security teams kept working. And they now indicate a possible motive:
"At this time, we believe this was, and continues to be, an intelligence gathering effort. We are taking all necessary steps to understand the full scope of this campaign and respond accordingly."
With four government agencies working together to continue investigating the SolarWinds attack, there are a lot of moving parts. This is how each agency is leading a part of the response:
For the latest joint statements and updates about the APT supply chain cyberattack, visit this CISA page and look for the dropdowns.