The #Russia|n hackers are "attempting to replicate the approach it has used in past attacks by targeting organizations integral to the global IT supply chain" per @Microsoft's @TomBurt45
The #Russia|n group, aka #Nobelium, "ultimately hopes to piggyback on any direct access that resellers may have to their customers’ IT systems & more easily impersonate an organization’s trusted technology partner to gain access to their downstream customers" per @Microsoft
"This recent activity is another indicator that #Russia is trying to gain long-term, systematic access to a variety of points in the technology supply chain & establish a mechanism for surveilling–now or in the future–targets of interest" per @Microsoft's @TomBurt45
"These attacks have been a part of a larger wave of #Nobelium activities" per @Microsoft's @TomBurt45 "Btw July 1 & October 19 this year, we informed 609 customers that they had been attacked 22,868 times by Nobelium, with a success rate in the low single digits"
"While the SolarWinds supply chain attack involved malicious code...this recent intrusion activity has involved leveraging stolen identities & the networks of technology solutions, services & reseller companies" per SVP Charles Carmakal
"This attack path makes it very difficult for victim organizations to discover they were compromised & investigate the actions taken by the threat actor" per @Mandiant's Carmakal in statement
"Similar to the victimology observed in the 2020 campaign, the targets of this intrusion activity appear to ultimately be gvt organizations & other organizations that deal in matters of interest to #Russia" per @Mandiant's Carmakal
• • •
Missing some Tweet in this thread? You can try to
force a refresh
HAPPENING NOW: From Sept 1 - Oct 25, "The US gvt has directly facilitated the departure of 240 US citizens & 157 lawful permanent residents, as well as others who have come out on out charters" @DOD_Policy Undersecretary Colin Kahl tells Senate Armed Services Committee
"We are examining & learning from the past..." per @DOD_Policy "...reckoning w/the uncomfortable truth that despite decades & billions of dollars of US investment, the #Afghan military evaporated in the face of the #Taliban assault"
US-#Afghanistan-counterterrorism: "We are actively setting the conditions to ensure we remain situationally aware & are postured to mitigate & neutralize developing terrorist threats & streams" @thejointstaff's LtGen James Mingus tells SASC
White House reax to continue hacking attempts by #Russia
"The federal government is aggressively using our authorities to protect the nation from cyber threats, including helping the private sector defend itself..." per @KJP46
Per @KJP46 those efforts include increased intelligence sharing, bilateral/multilateral diplomacy and "measuress we do not speak about publicly for national security reasons"
"Obviously we don't talk about what we do in the in cyberspace" per @PentagonPresSec on @Microsoft warning about #Russia's SVR, adding "I don't have any particular knowledge of this latest report"
NEW: "We remain laser focused right now on Hamid Karzai Int'l Airport in #Kabul & on doing everything we can" to evacuate American, Afghans, allies, per @SecDef
Says about 4,500 US troops in place - no hostile interactions w/#Taliban
US increasingly flow of aircraft, ppl out of #Kabul, per @SecDef
"Our US service members are making exceptional efforts under challenging circumstances" he adds
Another 1,000 US troops are expected to be there by the end of the day, bringing total to 3,500
"It's not a perfect process" per @PentagonPresSec on planning for evacuations at #Kabul airport
"You have to adjust in real time"
@PentagonPresSec says much of the planning & recent tabletop exercises for #Kabul airport did pay off
@DeptofDefense saw it as "a distinct possibility" #Taliban could overrrun the country & Kabul, he says, but that capitulation of so many #Afghan forces was surprising