The U.S. intelligence agencies including the National Security Council (NSC), the FBI, the Cybersecurity & Infrastructure Security Agency (CISA), and the Director of National Intelligence (ODNI) have jointly established the Cyber Unified Coordination Group (UCG) to coordinate the investigation and remediation of recent cyber incidents involving federal government networks.

The UCG stated that over 18,000 public and private sector customers of SolarWinds’ Orion product and around 10 U.S. government agencies were affected in the recent string of cyberattacks. The agency said it is still working to identify and notify the non-government entities who also may be impacted.

“This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks. At this time, we believe this was, and continues to be, an intelligence-gathering effort. We are taking all necessary steps to understand the full scope of this campaign and respond accordingly,” the agencies said in a statement.

All the federal agencies are supporting the UCG by providing their intelligence, cybersecurity expertise, mitigation measures, and guidance on evaluating the scale of the recent SolarWinds cyberattacks.

  • As the lead agency for threat response, the FBI is focused on four critical lines of effort – identifying victims, collecting evidence, analyzing the evidence to determine further attribution, and sharing results with the government and private sectors.
  • As the lead for asset response…

Read The Full Article at CISO Magazine