logo
episode-header-image
Apr 2021
14m 2s

The Story Behind The SolarWinds Cyberatt...

NPR
About this episode
Last year, hackers believed to be directed by the Russian intelligence service, the SVR, slipped a malicious code into a routine software update from a Texas- based company called SolarWinds. They then used it as a vehicle for a massive cyberattack against America and successfully infiltrated Microsoft, Intel, Cisco and other companies, and federal agencies including the Treasury Department, Justice Department, Energy Department and the Pentagon.

The Biden administration recently announced a roster of tough sanctions against Russia as part of what it characterized as the "seen and unseen" response to the SolarWinds breach.

NPR investigative correspondent Dina Temple-Raston has spent months examining the landmark attack that — based on interviews with dozens of players — reveals a hack unlike any other.

In participating regions, you'll also hear from local journalists about what's happening in your community.

Email us at considerthis@npr.org.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy
Up next
Yesterday
Bubbling questions about the limits of the AI revolution
OpenAI founder Sam Altman floated the idea of an AI bubble, an MIT report found that 95% of generative AI pilots at companies are failing and tech stocks took a dip.With the AI sector is expected to become a trillion dollar industry within the next decade, what impact might slowi ... Show More
10m 46s
Aug 23
High stakes diplomacy and canceled Halibut Olympia, insights from the Alaska Summit
Normally, foreign policy summits between world leaders involve painstaking planning and organization days and weeks in advance. The hectic and last minute nature of the meeting between President Trump and Russian President Vladimir Putin in Alaska provided a window into how so mu ... Show More
12m 31s
Aug 22
Famine is declared in Gaza. Will anything change?
The people of Northern Gaza are starving. That’s according to an official declaration by a United Nations-backed group of experts, who comprise the Integrated Food Security Phase Classification or IPC. They say that famine has officially reached Gaza city and could soon reach oth ... Show More
7m 45s
Recommended Episodes
Aug 2022
Russian cyberespionage and influence op disrupted. RedAlpha versus Chinese minorities and (of course) Taiwan. Evil PLC proof-of-concept. Cl0p takes a poke at a water utility.
Microsoft identifies and disrupts Russian cyberespionage activity. An update on RedAlpha. An evil PLC proof-of-concept shows how programmable logic controllers could be "weaponized." Ben Yelin has an update on right to repair. Our guest is Arthur Lozinski of Oomnitza with a look ... Show More
26m 19s
Mar 2023
How A Satellite Hack Became a Cybersecurity Wakeup Call
People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time.  Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ... Show More
31m 54s
Jun 2021
Who is Hacking the U.S. Economy?
In the past few weeks, some of the biggest industries in the U.S. have been held up by cyberattacks.The first big infiltration was at Colonial Pipeline, a major conduit of gas, jet fuel and diesel to the East Coast. Then, J.B.S., one of the world’s largest beef suppliers, was hit ... Show More
22m 31s
Feb 2023
How the C2C market sustains ransomware gangs. In Russia’s war, intelligence services deploy wipers, and hacktivist auxiliaries handle the DDoS. And a look into other corners of the cyber underworld.
Microsoft tallies more than a hundred ransomware gangs. Sandworm's NikoWiper hits Ukraine's energy sector. Mobilizing cybercriminals in a hybrid war. Firebrick Ostrich and business email compromise. Telegram is used for sharing stolen data and selling malware. Crypto scams find t ... Show More
31m 34s
Aug 2023
China accuses the US of cyberespionage. Backdoors found in NetScaler. Account hijacking campaigns. Raccoon Stealer gets an update. Cryptocurrency recovery scams. Narrative control in the hybrid war.
China accuses the US of installing backdoors in a Wuhan lab. NetScaler backdoors are found. A Phishing scam targets executives. LinkedIn sees a surge in account hijacking. Raccoon Stealer gets an update. Cryptocurrency recovery scams. We kick off our new Learning Layer segment wi ... Show More
30m 58s
Jan 2024
How SolarWinds Responded to the 2020 SUNBURST Cyberattack
In December of 2020, SolarWinds learned that they had fallen victim to a widespread malware supply chain attack. This attack granted hackers access to thousands of it customers’ data, including military and government agencies across the globe. General Counsel Jason Bliss needed ... Show More
28m 39s
Feb 2023
Blender is back, but now DBA Sinbad (still working for the Lazarus Group). Cyberespionage notes. Hacktivism. ICS threats. Valentine’s Day scams.
"Blender" reappears as "Sinbad." A Tonto Team cyberespionage attempt against Group-IB is thwarted. DarkBit claims responsibility for a ransomware attack on Technion University. An overview of ICS and OT security. Ben Yelin looks at surveillance oversight at the state level. Ann J ... Show More
27 m
Jan 2023
Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.
A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic W ... Show More
28m 12s
Sep 2023
DPRK cyberespionage update. New cybercriminal TTPs. The state of DevSecOps. Hacktivism and the nation-state. Cyberwar lessons learned. A free decryptor for Key Group ransomware.
A VMConnect supply chain attack is connected to the DPRK. Reports of an aledgedly "fully undetectable information stealer." DB#JAMMER brute forces exposed MSSQL databases. A Cyberattack on a Canadian utility. The state of DevSecOps. A look at hacktivism, today and beyond. Betsy C ... Show More
31m 33s