{"id":38763,"date":"2020-12-18T01:59:07","date_gmt":"2020-12-18T01:59:07","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/"},"modified":"2020-12-18T01:59:07","modified_gmt":"2020-12-18T01:59:07","slug":"us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/","title":{"rendered":"US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor"},"content":{"rendered":"<p>America&#8217;s nuclear weapons agency was hacked by the suspected Russian spies who backdoored SolarWinds&#8217; IT monitoring software and compromised several US government bodies, and Microsoft was caught up in the same cyber-storm, too, it was reported Thursday.<\/p>\n<p>The Windows giant uses SolarWinds&#8217; network management suite Orion, downloads of which were <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/12\/15\/solar_winds_update\/\" rel=\"noopener noreferrer\">secretly trojanized<\/a> earlier this year so that when installed within certain targets \u2013 such as the US government departments of State, Treasury, Homeland Security, and Commerce \u2013 the malicious code&#8217;s masterminds could slip into their victims&#8217; networks, execute commands, read emails, steal data, and so on.<\/p>\n<p>Reuters <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.reuters.com\/article\/us-usa-cyber-breach\/exclusive-suspected-russian-hacking-spree-reached-into-microsoft-sources-idUSKBN28R2ZJ\">said<\/a> Microsoft&#8217;s security was &#8220;breached&#8221; by the same crew, and implied this was achieved either through Orion, or some other means, pointing out Homeland Security warned that the hackers, thought to be the Kremlin&#8217;s APT29 aka Cozy Bear team, have found multiple ways into various organizations.<\/p>\n<p>While Microsoft&#8217;s comms veep Frank Shaw confirmed the Redmond mega-corp is a SolarWinds user and had installed the tainted Orion updates, he said no evidence could be found that production systems and customer data was accessed by the suspected Russian foreign intelligence snoops. The PR chief also denied the newswire&#8217;s claim that Microsoft&#8217;s platforms were commandeered to hack its own customers.<\/p>\n<blockquote class=\"pullquote\" readability=\"6\">\n<p>We detected malicious SolarWinds binaries in our environment, which we isolated and removed<\/p>\n<\/blockquote>\n<p>&#8220;Like other SolarWinds customers, we have been actively looking for indicators of this actor and can confirm that we detected malicious SolarWinds binaries in our environment, which we isolated and removed,&#8221; Shaw said in a statement. &#8220;We have found no evidence of access to production services or customer data. Our investigations, which are ongoing, have found absolutely no indicators that our systems were used to attack others.&#8221;<\/p>\n<p><i>El Reg<\/i> hopes that means non-production services \u2013 such as internal development and test networks, back offices, and the like \u2013 were not accessed by the miscreants, and that the absence of evidence doesn&#8217;t mean the hackers didn&#8217;t simply delete their tracks, nor leave any in the first place. In other words, the spirit of this official statement says nothing more than the backdoored Orion updates were installed, and nothing of consequence happened, while the letter of the statement leaves the scope and damage of the intrusion fairly wide open.<\/p>\n<p>For what it&#8217;s worth, according to one of Reuters&#8217; sources, the hackers &#8220;made use of Microsoft cloud offerings while avoiding Microsoft\u2019s corporate infrastructure.&#8221;<\/p>\n<p>Separately, Microsoft president Brad Smith <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/12\/17\/cyberattacks-cybersecurity-solarwinds-fireeye\/\">said<\/a> his staff &#8220;has identified and has been working this week to notify more than 40 customers that the attackers targeted more precisely and compromised through additional and sophisticated measures&#8221; beyond the tainted Orion updates.<\/p>\n<h3 class=\"crosshead\"> <span>Going nuclear<\/span><br \/>\n<\/h3>\n<p>Meanwhile, Politico <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.politico.com\/news\/2020\/12\/17\/nuclear-agency-hacked-officials-inform-congress-447855\">reported<\/a> that the US government&#8217;s Dept of Energy&#8217;s National Nuclear Security Administration, which oversees the nation&#8217;s nuke stockpile, was hacked via the Orion backdoor. Suspicious network activity was, we&#8217;re told, found at the Federal Energy Regulatory Commission, the Sandia and Los Alamos national laboratories in New Mexico and Washington, the Office of Secure Transportation at the nuclear administration, and the Richland Field Office of the DoE.<\/p>\n<p>A Dept of Energy spokesperson said: &#8220;At this point, the investigation has found that the malware has been isolated to business networks only, and has not impacted the mission essential national security functions of the department, including the National Nuclear Security Administration.&#8221;<\/p>\n<p>It also emerged on Thursday that the city of Austin in Texas was <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/theintercept.com\/2020\/12\/17\/russia-hack-austin-texas\/\">hit<\/a> by suspected Russian hackers, according to The Intercept. This is an interesting one, as tech outfits such as <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/12\/12\/california_oracle_texas\/\" rel=\"noopener noreferrer\">Oracle<\/a> and <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/12\/02\/hpe_q4_fy2020_texas\/\" rel=\"noopener noreferrer\">HPE<\/a> lately said they are shifting their corporate HQs to the US state.<\/p>\n<p>SolarWinds&#8217; Orion software is used by at least 300,000 customers, ranging from <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/12\/14\/solarwinds_fireeye_cozybear_us_government\/\" rel=\"noopener noreferrer\">American<\/a> and <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/12\/14\/solarwinds_public_sector\/\" rel=\"noopener noreferrer\">British government bodies<\/a>, to Fortune 500 companies. With some 18,000 clients said to have downloaded and installed the maliciously tampered updates, this hacking campaign has the potential to touch all walks of life, and hand mountains of intelligence, emails, and other data to, as alleged, Moscow.<\/p>\n<h3 class=\"crosshead\"> <span>Killswitch activated<\/span><br \/>\n<\/h3>\n<p>FireEye \u2013 which has been investigating the Orion fiasco after it was <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/12\/09\/fireeye_tools_hacked\/\" rel=\"noopener noreferrer\">hacked<\/a> by some means by, again, allegedly Russia \u2013 told us that the infosec giant worked with GoDaddy and Microsoft to activate a remote killswitch within the backdoor smuggled into the Orion updates. Sources familiar with Microsoft&#8217;s operations confirmed as much.<\/p>\n<p>Basically, we&#8217;re told, when a backdoored version of the network monitoring software is run, it looks up the IP address of the hard-coded domain avsvmcloud[.]com. Depending on the result, the backdoor malware, dubbed SUNBURST by FireEye, will deactivate. So, with Microsoft taking control of that domain name, with DNS giant GoDaddy&#8217;s help, the tech trio killed off the malware by ensuring the dotcom resolves to an IP address that deactivates the code. This is similar to the <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2017\/05\/13\/wannacrypt_ransomware_worm\/\" rel=\"noopener noreferrer\">WannaCry killswitch<\/a>.<\/p>\n<p>&#8220;As part of FireEye&#8217;s analysis of SUNBURST, we identified a killswitch that would prevent SUNBURST from continuing to operate,&#8221; a spokesperson for FireEye told <i>The Register<\/i>. &#8220;Depending on the IP address returned when the malware resolves avsvmcloud[.]com, under certain conditions, the malware would terminate itself and prevent further execution. FireEye collaborated with GoDaddy and Microsoft to deactivate SUNBURST infections.<\/p>\n<p>&#8220;This killswitch will affect new and previous SUNBURST infections by disabling SUNBURST deployments that are still beaconing to avsvmcloud[.]com. However, in the intrusions FireEye has seen, this actor moved quickly to establish additional persistent mechanisms to access to victim networks beyond the SUNBURST backdoor. This killswitch will not remove the actor from victim networks where they have established other backdoors. However, it will make it more difficult to for the actor to leverage the previously distributed versions of SUNBURST.&#8221;<\/p>\n<p>Thus, if you installed a trojanized version of Orion, don&#8217;t assume it&#8217;s over after updating to a good, clean version and knowing that the killswitch is on. You&#8217;ll have to hunt through your network for any followup infections or backdoors implanted by the suspected Russian miscreants. Speaking of which&#8230;<\/p>\n<h3 class=\"crosshead\"> <span>Time to rip and replace<\/span><br \/>\n<\/h3>\n<p>America&#8217;s US Cybersecurity and Infrastructure Security Agency (CISA) issued an alert on Thursday that SolarWinds was not the only way America&#8217;s servers have been pwned this year by what is believed to be APT29, saying that it has detected multiple intrusions, some persistent, in a campaign that has been ongoing since at least March, not all involving SolarWinds.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/12\/16\/shuttestock_solarwinds.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Outside the SolarWinds office building\"><\/p>\n<h2 title=\"VC firms say they weren't aware Orion code had been backdoored\">SolarWinds\u2019 shares drop 22 per cent. But what\u2019s this? $286m in stock sales just before hack announced?<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2020\/12\/16\/solarwinds_stock_sale\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>&#8220;This adversary has demonstrated an ability to exploit software supply chains and shown significant knowledge of Windows networks,&#8221; it <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a\">warned<\/a> [<a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/AA20-352A-APT_Compromise_of_Government_Agencies%2C_Critical%20Infrastructure%2C_and_Private_Sector_Organizations.pdf\">PDF<\/a>].<\/p>\n<p>&#8220;It is likely that the adversary has additional initial access vectors and tactics, techniques, and procedures (TTPs) that have not yet been discovered. CISA will continue to update this Alert and the corresponding indicators of compromise (IOCs) as new information becomes available.&#8221;<\/p>\n<p>With regards to the SolarWind disaster, CISA is recommending admins be on the guard for rogue Security Assertion Markup Language (SAML) tokens, which were a primary method for network traversal. Long-duration tokens, up to 24 hours rather than the usual one-hour, are particularly suspect, as are those that were used as soon as they were created. If in doubt, ripping and replacing entire identity systems is recommended.<\/p>\n<p>&#8220;Simply mitigating individual issues, systems, servers, or specific user accounts will likely not lead to the adversary\u2019s removal from the network,&#8221; the advisory states.<\/p>\n<p>&#8220;In such cases, organizations should consider the entire identity trust store as compromised. In the event of a total identity compromise, a full reconstitution of identity and trust services is required to successfully remediate. In this reconstitution, it bears repeating that this threat actor is among the most capable, and in many cases, a full rebuild of the environment is the safest action.&#8221;<\/p>\n<p>The NSA has issued similar advice regarding SAML tokens and Microsoft Azure-based authentication, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.nsa.gov\/News-Features\/Feature-Stories\/Article-View\/Article\/2451159\/nsa-cybersecurity-advisory-malicious-actors-abuse-authentication-mechanisms-to\/\">here<\/a>. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/12\/18\/solarwinds_nnsa_microsoft_cisa\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Windows giant, nuclear administration play down danger \u2013 and kill switch found and activated America&#8217;s nuclear weapons agency was hacked by the suspected Russian spies who backdoored SolarWinds&#8217; IT monitoring software and compromised several US government bodies, and Microsoft was caught up in the same cyber-storm, too, it was reported Thursday.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38764,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-38763","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-18T01:59:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor\",\"datePublished\":\"2020-12-18T01:59:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/\"},\"wordCount\":1323,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/\",\"name\":\"US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor.jpg\",\"datePublished\":\"2020-12-18T01:59:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/","og_locale":"en_US","og_type":"article","og_title":"US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-18T01:59:07+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor","datePublished":"2020-12-18T01:59:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/"},"wordCount":1323,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/","url":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/","name":"US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor.jpg","datePublished":"2020-12-18T01:59:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/us-nuke-agency-hacked-by-suspected-russian-solarwinds-spies-microsoft-also-installed-backdoor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"US nuke agency hacked by suspected Russian SolarWinds spies, Microsoft also installed backdoor"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38763"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38763\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38764"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}