Senate Intelligence Committee Releases Bipartisan Report Detailing Foreign Intelligence Threats
WASHINGTON – Today, Senate Select Committee on Intelligence Chairman Mark R. Warner (D-VA) and Vice Chairman Marco...
[Senate Hearing 117-79]
[From the U.S. Government Publishing Office]
S. Hrg. 117-79
OPEN HEARING: HACK OF
U.S. NETWORKS BY A FOREIGN ADVERSARY
=======================================================================
HEARING
BEFORE THE
SELECT COMMITTEE ON INTELLIGENCE
OF THE
UNITED STATES SENATE
ONE HUNDRED SEVENTEENTH CONGRESS
FIRST SESSION
__________
TUESDAY, FEBRUARY 23, 2021
__________
Printed for the use of the Select Committee on Intelligence
[GRAPHIC NOT AVAILABLE IN TIFF FORMAT]
Available via the World Wide Web: http://www.govinfo.gov
__________
U.S. GOVERNMENT PUBLISHING OFFICE
45-485 PDF WASHINGTON : 2022
-----------------------------------------------------------------------------------
SELECT COMMITTEE ON INTELLIGENCE
[Established by S. Res. 400, 94th Cong., 2d Sess.]
MARK R. WARNER, Virginia, Chairman
MARCO RUBIO, Florida, Vice Chairman
DIANNE FEINSTEIN, California RICHARD BURR, North Carolina
RON WYDEN, Oregon JAMES E. RISCH, Idaho
MARTIN HEINRICH, New Mexico SUSAN COLLINS, Maine
ANGUS KING, Maine ROY BLUNT, Missouri
MICHAEL F. BENNET, Colorado TOM COTTON, Arkansas
BOB CASEY, Pennsylvania JOHN CORNYN, Texas
KIRSTEN E. GILLIBRAND, New York BEN SASSE, Nebraska
CHUCK SCHUMER, New York, Ex Officio
MITCH McCONNELL, Kentucky, Ex Officio
JACK REED, Rhode Island, Ex Officio
JAMES INHOFE, Oklahoma, Ex Officio
----------
Michael Casey, Staff Director
Brian Walsh, Minority Staff Director
Kelsey Stroud Bailey, Chief Clerk
C O N T E N T S
----------
FEBRUARY 23, 2021
OPENING STATEMENTS
Page
Warner, Hon. Mark R., a U.S. Senator from Virginia............... 1
Rubio, Hon. Marco, a U.S. Senator from Florida................... 4
WITNESSES
Mandia, Kevin, CEO, FireEye, Inc................................. 6
Prepared statement........................................... 9
Ramakrishna, Sudhakar, CEO, SolarWinds Inc....................... 14
Prepared statement........................................... 16
Smith, Brad, President, Microsoft Corporation.................... 23
Prepared statement........................................... 26
Kurtz, George, Co-Founder and CEO, CrowdStrike................... 41
Prepared statement........................................... 44
SUPPLEMENTAL MATERIAL
Responses of Kevin Mandia to Questions for the Record............ 86
Responses of Sudhakar Ramakrishna to Questions for the Record.... 90
Responses of Brad Smith to Questions for the Record.............. 94
Responses of George Kurtz to Questions for the Record............ 107
OPEN HEARING: HACK OF
U.S. NETWORKS BY A FOREIGN ADVERSARY
----------
TUESDAY, FEBRUARY 23, 2021
U.S. Senate,
Select Committee on Intelligence,
Washington, DC.
The Committee met, pursuant to notice, at 2:32 p.m., in
Room SD-106 in the Dirksen Senate Office Building, Hon. Mark R.
Warner (Chairman of the Committee) presiding.
Present: Senators Warner, Rubio, Feinstein, Wyden,
Heinrich, King, Bennet, Casey (via WebEx), Gillibrand, Burr,
Risch, Collins, Blunt, Cotton, Cornyn, and Sasse.
OPENING STATEMENT OF HON. MARK R. WARNER, A U.S. SENATOR FROM
VIRGINIA
Chairman Warner. Good afternoon, everyone. I'd like to call
this hearing to order and apologize to our witnesses and others
with them. With COVID and a vote just been called, we're going
to a little bit be playing this by ear. So I'm going to make my
opening statement, ask the Vice Chairman to make his opening
statement. We'll be monitoring the vote, which just opened a
moment ago. We've got two, so we'll either tag team through
this or take a five-minute recess to get us all a chance to go
vote on both these items.
First, I'd like to take this opportunity to welcome our two
new Members, one of which I think at least is on Zoom, Senator
Casey, and also Senator Gillibrand, to the Committee. I look
forward to working with both of you as Members of the Senate
Intelligence Committee in the bipartisan tradition of this
Committee.
The Intelligence Committee's record of working together in
the interests of America's national security has been due, in
no small part, to the tireless efforts of our former Chairman,
Senator Burr, and our new Vice Chairman, Senator Rubio. So I
want to take this opportunity during my first hearing as
Chairman, to thank you both for your partnership and
friendship. I'm confident that we'll be able to keep working
together in a bipartisan way in the 117th Congress.
I'd also very much like to welcome our witnesses today:
Kevin Mandia, CEO of FireEye; Sudhakar Ramakrishna, President
and CEO of SolarWinds; Brad Smith, President of Microsoft
Corporation; and, I believe remotely, George Kurtz, President
and CEO of CrowdStrike. I would like for the record to note
that we also asked a representative from Amazon Web Services to
join us today but, unfortunately, they declined. But we will be
expecting to get a full update--and we've had one update from
our friends at Amazon--but it would be most helpful if in the
future they actually attended these hearings.
Today's hearing is on the widespread compromise of public
and private computer networks in the United States by a foreign
adversary, colloquially or commonly called ``the SolarWinds
hack.'' While most infections appear to have been caused by a
trojanized update of SolarWinds's Orion software, further
investigations have revealed additional victims who do not use
SolarWinds's tools. It has become clear that there is much more
to learn about this incident, its causes, its scope and scale,
and where we go from here.
This is the second hearing this Committee has held on this
topic. Our first was a closed hearing held on the now-infamous
January 6th to hear from government officials responding to the
SolarWinds incident. It's going to take the combined power of
both the public and private sector to understand and respond to
what happened. Preliminary indications suggest that the scope
and scale of this incident are beyond any that we've confronted
as a Nation and its implications are significant.
Even though what we've seen so far indicates that this was
carried out as an espionage campaign targeting more than 100 or
so companies and government agencies, the reality is the
hackers responsible have gained access to thousands of
companies and the ability to carry out far more destructive
operations if they'd wanted to. And I want to repeat that. This
intrusion had the possibility of being exponentially worse than
what has come to pass so far.
The footholds these hackers gained into private networks,
including some of the world's largest IT vendors, may provide
opportunities for future intrusions for years to come. One of
the reasons the SolarWinds hack has been especially concerning
is that it was not detected by the multibillion-dollar U.S.
Government cybersecurity enterprise or anyone else until the
private security firm, FireEye--and I want to again complement
our friend, Kevin Mandia, who's appeared before this Committee
a number of times--on their own without a requirement to
report, actually publicly announced that it had detected a
breach of its own network by a nation-state intruder.
A very big question looming in my mind is: Had FireEye not
detected this compromise in December and chosen on their own to
come forward, would we still be in the dark today? As Deputy
National Security Adviser, Anne Neuberger, who has been chosen
by the President to lead the response in this, and to the
SolarWinds hack, said last week, ``The response to this
incident from both the public and private sector is going to
take a long time.''
All of our witnesses today are involved in some aspect of
the private sector response to this incident. I want to hear
from them on the progress so far, the challenges we'll need to
overcome in order to fully expel these hackers, and how we can
prevent supply-chain attacks like this in the future. I'd also
like to hear from them about their experiences working with the
Federal Government, namely, the Unified Coordination Group, in
mitigating this compromise.
The SolarWinds hack was a sophisticated and multifaceted
operation: a software supply chain operation that took
advantage of trusted relationships with software providers in
order to break into literally thousands of entities. Combined
with the use of this sophisticated authentication exploits, it
also leveraged vulnerabilities and major authentication
protocols, basically granting the intruder the keys to the
kingdom, allowing them to deftly move across both on-premises
and cloud-based services, all while avoiding detection.
While many aspects of this compromise are unique, the
SolarWinds hack has also highlighted a number of lingering
issues that we've ignored for too long. This presents us an
opportunity for reflection and action. A lot of people are
offering solutions, including mandatory reporting requirements,
wider use of multi-factor authentication, requiring a software
bill of goods, and significantly improving threat information
sharing between the government and the private sector.
I've got a number of questions, but there are three that
I'd like to pose in my opening.
One, why shouldn't we have mandatory reporting systems,
even if those reporting systems require some liability
protection, so we can better understand and better mitigate
future attacks? As I pointed out, Senator Collins was way ahead
of all of us on this issue, literally years and years ago, when
she and Senator Lieberman first put forward legislation that
required this critical, mandatory reporting on critical
infrastructure.
There's an open question, though, on who should receive
such report, even if you put that mandatory reporting in place.
Do we need something like the National Transportation Safety
Board, or other public-private entity that can immediately
examine major breaches to see if we have a systemic problem, as
we seem to see in this case? I think there's also some truth to
the idea that if a tier-one adversary, a foreign nation-state,
sends their A team against almost any ordinary company in the
world, chances are they're going to get in. But that cannot be
an excuse for doing nothing to build defenses and making it
harder for them to be successful once inside an enterprise. I'm
very interested in hearing from the witnesses what they think
our policy response should be, and what solutions they will
actually they think will actually improve cybersecurity and
incident reporting in the United States.
Beyond the immediate aspects of the SolarWinds hack are
larger issues that this Committee needs to consider. Do we need
to finally come to some agreement on common norms in
cyberspace, hopefully, again, on an international basis, that
potentially are enforceable, and at least says to our
adversaries: If you violate these warm norms, there will be
known consequences? For example, we have these norms in other
conflicts. We have military conflict that exists, but there's
been for some time a norm that you don't knowingly bomb a
hospital or bomb an ambulance that's got a Red Cross shield on
it. Should we, therefore, consider efforts that subvert
patching, which are all about fixing vulnerabilities to be
similarly off limits?
Once again, I want to thank our witnesses for joining us
today, both in person and remotely. I personally talked to
nearly all of our witnesses, in some cases multiple times since
this incident was first reported. I appreciate their
transparency and willingness to be part of this conversation.
After our witnesses conclude their remarks, we'll move to a
round of five-minute questions based upon order of arrival. As
reminder to my colleagues, this incident is not over. So too
are the criminal investigations by the FBI. So there might be
some questions our witnesses cannot answer. However, I'm
confident we'll get those answers at some point as we move
forward. I now recognize the Vice Chairman for a statement.
OPENING STATEMENT OF HON. MARCO RUBIO, A U.S. SENATOR FROM
FLORIDA
Vice Chairman Rubio. Thank you, Mr. Chairman, and thanks
for convening this hearing. And I'd like to welcome our
witnesses from Microsoft, FireEye, SolarWinds, and CrowdStrike
who are here to help the Committee's examination of what is the
largest cyber-supply chain operation ever detected. So we
really do appreciate you being with us.
As the Chairman mentioned, we had extended an invitation to
Amazon to participate. The operation we'll be discussing today
used their infrastructure, at least in part, to be successful.
Apparently, they were too busy to discuss that here with us
today and I hope they'll reconsider that in the future.
This operation involved, as has already been said, the
modification of the SolarWinds Orion platform, which is a
widely-used software product. It included a malicious backdoor
that was downloaded, from my understanding, to up to 18,000
customers between March and June of last year. But the most
insidious part of this operation was that it hijacked the very
security advice promulgated by computer security professionals
to verify and apply patches as they are issued.
So there are many concerning aspects to this first-of-its-
kind operation, at least at this scale, that has raised
significant questions. My understanding is that if FireEye had
not investigated an anomalous event within their own network in
November of last year, it's possible this would be a continuing
and unfettered operation to this day.
I think everyone's asking, despite the investment that's
been made in cybersecurity collectively between the government
and the private sector, how no one detected this activity
earlier, as it appears that they have been in the system for
close to five to six months before it was detected--maybe even
longer; closer to a year. But the bottom-line question is, how
did we miss this? And what are we still missing? And what do we
need to do to make sure that something like this, using these
sorts of tools, never happens again?
Second, I think there's great interest in knowing exactly
what these actors did. Based on what we know, to include what
government has stated publicly, the actor seems to have
undertaken follow-on operations against a very small subset of
the 18,000 networks to which they potentially had access. So
aside from the mechanical aspects of removing a hacker from a
network, what do we know about why these actors chose the
targets that they did? What actions did they undertake within
those networks? And what do we know that we do not know? I
always love that question. What do we know that we do not know?
In essence, what are the open questions now and in the future
about these sorts of tools and how they can be used? Or what do
we still have open ended that we are not able to answer at this
time? And perhaps most importantly, who has the single
comprehensive view of the totality of activity undertaken?
That's another thing that everyone has struggled with is who
can see the whole field here on this?
And third, what is it going to take to rebuild and have
confidence in our networks? And speaking with several of you in
the days leading up to this, one of the hallmarks of this
operation was the great care that was taken by this adversary
to use bespoke infrastructure and tradecraft for each victim.
Unlike other malware or ransomware, cleanup operations, there
is no template here that can be used for remediation. So what's
it going to take to have confidence in both government and in
the private sector networks again?
Fourth, what do we need to do to raise the bar for the
cybersecurity of this Nation? Is cyber deterrence an achievable
goal? How do we need to enhance cybersecurity information
logging and sharing across the spectrum to protect against APTs
in the future?
And finally, though this is a question for the government
rather than the witnesses here today, I think it's important
for this Committee to ask itself, and to inform the Members of
the Senate, what does the United States Government need to do
to respond to this operation?
Government officials initially stated this was an
intelligence gathering operation. Just recently, however, the
White House stated, quote: ``When there is a compromise of this
scope and scale, both across government and across the U.S.
technology sector to lead to follow-on intrusions, it is more
than a single incident of espionage. It is fundamentally of
concern for the ability for this to become disruptive.'' End
quote. While I share this concern that an operation of this
scale, with a disruptive intent, could have caused mass chaos,
those are not the facts that are in front of us. Everything we
have seen thus far indicates that at some level, this was an
intelligence operation and a rather successful one that was
ultimately disrupted.
While there are a myriad of ways for sovereign states to
respond, I caution against the use of certain terms at this
time until the facts lead us to the use of terms such as attack
and so forth. I've always advocated for standing up to our
adversaries. I think that's important. I will continue to
advocate for that. But I want to know today what the actor's
intent seemed to be and to the extent of the damage before we
categorize it. It may very well have reached that level.
This Committee and the rest of the Congress should consider
what policies we need to pursue to better defend our Nation's
critical networks, in order to get a fuller view of the
problem. Perhaps we should consider mandating certain types of
reporting, as the Chairman already mentioned. As it relates to
cyber-attacks, we must improve the information-sharing, of this
there is no doubt, between the Federal Government and the
private sector. And I look forward to being an active and
constructive participant in these debates on these new issues,
as I know every Member on this Committee is.
And with that, I again, want to welcome you and thank you
for the testimony and the insights that you will share with us
and the American people. It is important that the public
understand the current persistent information conflict that the
United States finds itself in against nation-state adversaries
like Russia, but also like China and Iran and North Korea.
Thank you, Mr. Chairman.
Chairman Warner. Thank you, Senator Rubio. I think we're
going to go ahead and we'll just tradeoff. I believe the order
of the speakers is going to be: FireEye, SolarWinds, Microsoft,
and CrowdStrike.
So Kevin, if you want to start us off, that'd be great.
STATEMENT OF KEVIN MANDIA, CEO, FIREEYE, INC.
Mr. Mandia. Thank you, Mr. Chairman, Vice Chairman Rubio,
and the rest of the Members of the Senate Intelligence
Committee. It is a privilege to be here with the opportunity to
speak with you.
And as the first witness, I'm going to discuss what
happened from a first-hand experience as a stage two victim to
this intrusion. I have opinions on who did it. I have opinions
on what to do about it. But in the next four minutes, I don't
have enough time to get through all that. So I look forward to
your questions.
I just want to give you a little background on FireEye.
Responding to breaches is what we do for a living. We have a
whole bunch of Quincy-type people that do forensics 2,000 hours
a year. And people hire us to figure out what happened and what
to do about it when they have a security breach. We responded
to over 1,000 breaches in 2020. It was a tough year for chief
information security officers. And as I sit here right now
testifying to you, we're responding to over 150 computer
security breaches.
In short, this is what we do for a living. And what we're
going to tell you today, we tell you with high confidence and
high fidelity on the intent of the attackers and what they did.
So now I want to present kind of the anatomy of this
attack. You know, we're referring to it as the SolarWinds
campaign. But it's a little bit broader than that. Whoever this
threat actor is--and we all pretty much know who it is--this
has been a multi-decade campaign for them. They just so
happened to, in 2020, create a backdoor SolarWinds implant.
So the first part of this ongoing saga, stage one of this
campaign, was you had to compromise SolarWinds. And the
attackers did something there that was unique in that they
didn't modify the source code there, they modified the build
process, which to me means this is a more portable attack than
just at SolarWinds. When you modify the build process, you're
doing the last step of what happens before code becomes
production for your buyers and customers, which just shows this
is a very sophisticated attacker.
And once they did that stage one compromise of SolarWinds,
we didn't find the implant till December 2020. And it had been
out there, if you look at a timeframe perspective, from March
2020 and there was an update in June 2020, as well. But the
attacker did something interesting when you get the timing.
They did a dry run in October 2019, where they put innocuous
code into the SolarWinds build just to make sure the result of
their intrusion was making it into the SolarWinds platform
production environment.
I want to explain how we found this implant because there's
no magic wand to say where's the next implant? When we were
compromised, we were set up to do that investigation. It's what
we do. We put almost 100 people on this investigation. Almost
all of them had 10,000 hours there, so to speak, 10,000 hours
of doing investigations, and we unearthed every clue we could
possibly find. And we still didn't know. So how did the
attacker break in?
So we had to do extra work. And at some point in time,
after exhausting every investigative lead, the only thing left
was--the earliest evidence of compromised was a SolarWinds
server. And we had to tear it apart. And what I mean by that is
we had to decompile it. Specifically, there were 18,000 files
in the update, 3,500 executable files. We had over a million
lines of assembly code. For those of you that haven't looked at
assembly, you don't want to. It's something that you have to
have specialized expertise to review, understand, piece apart,
and we found the proverbial needle in the haystack--an implant.
But how do we get there? Thousands of hours of humans
investigating everything else. And that's one of the reasons I
share that as you wonder why people missed it. This was not the
first place you'd look; this was the last place you'd look for
an intrusion. Over 17,000 companies were compromised by that
implant.
So stage one was to compromise SolarWinds, get an implant
in, and indiscriminately went to the 17,000 folks that
downloaded it. That means the attackers had a menu of 17,000
different companies.
Stage two of this attack was the companies that these
attackers intended to do additional action on and I want to
talk about what they did during stage two victims. I want to
say, stage one, the attacker hasn't done anything more than
crack open the window into a company. But they haven't gone
into the house to rob anything yet.
Stage two, they go into the house to rob it. When we look
at the stage two threat actor, or stage two victims, this is
where Microsoft's top-down viewpoint from their Cloud, where
there's a lot of activity, comes up with approximately 60
victim organizations. And we read that the government is aware
of about 100 organizations. For us being a stage two, we had
first-hand account of what they do. The attackers came in
through the SolarWinds implant. And the very first thing they
did is went for your keys, your tokens. Basically, they stole
your identity architecture so they could access your networks
the same way your people did.
And that's why this attack was hard to find because these
attackers, from day one, they had a backdoor. Imagine almost a
secret door in your house and the first thing that happens when
it comes to that secret door is all your keys are right there.
They just grab them, and now they can get into any locks you
have in your house the same way your people do. And I think,
during a pandemic, where everybody's working from home, it's
way harder to detect an attack like this, where the only
indicator of compromise was just somebody logging in as one of
your employees. And there's nothing else far-fetched about
that.
Right after they got our valid credentials, our two-factor
authentication mechanisms bypassed, they went to our O365
environment. And whether it was O365, or something else, I've
had enough experience over my 25 years of responding to
breaches to know this group targets specific people, almost
like they have collection requirements. So there they targeted
emails and documents. So stage two was: get credentials so you
could log in; get the keys to the safety deposit boxes; stage
the next step. Step two of that was access email, access
documents with said keys.
And then the third thing was dependent on who you were, and
what you did, and what industry you are as a victim. But it's
primarily what I put in the other category: steal source code,
steal software. In the case of FireEye, take some of our red
teaming tools that we use to assess people's security programs.
Bottom line: exceptionally hard to detect. And when I got
my first briefing on this and reviewed the facts on day one,
everything about this aligned to a threat actor, who, it is my
opinion, was more concerned about operational security than
mission accomplished. And that the minute you could detect
these folks and stop them breaking through the door, they sort
of evaporated like ghosts until their next operation.
So with that, on behalf of FireEye, I'd like to thank all
of you for the opportunity to set the stage for the other
witnesses. I'm very excited to work with all of you, and to my
fellow witnesses and others in the private sector as well as
the public sector to advance our Nation in defending ourselves
in cyberspace. And I look forward to taking your questions.
[The prepared statement of Mr. Mandia follows:]
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
Chairman Warner. Thank you, Kevin.
Sudhakar?
STATEMENT OF SUDHAKAR RAMAKRISHNA, CEO, SOLARWINDS INC.
Mr. Ramakrishna. Chairman Warner, Vice Chairman Rubio, and
Members of the Committee, on behalf of SolarWinds' employees,
partners, and customers in the U.S. and around the world, I
would first like to say thank you for inviting us to this
hearing.
By way of background, I'm Sudhakar Ramakrishna, and I
joined SolarWinds on January 4th of this year. Prior to
SolarWinds, I was with a company called PulseSecure for over
five years, and previously held executive roles at other
technology companies.
In my roles, I've been involved with cyber incidents and
have seen firsthand the challenges they present, as well as the
opportunities they create for learnings and improvements. While
our products and customers were the subject of this unfortunate
and reckless operation, we take our obligation very seriously,
to work tirelessly to understand it better to help our
customers, and to be transparent with our learnings with our
industry colleagues and the government.
SolarWinds started in 1999 in Oklahoma as a provider of
network tools and to this date, we have remained true to our
mission of helping IT professionals solve their problems and
manage their networks, now through more than 90 products.
Today, we remain a U.S.-headquartered company, with over 3,000
employees working extremely hard to deliver customer success.
When we learned of these attacks, our very first priority,
and that remains true today, was the safety and protection of
our customers. Our teams worked incredibly hard and tirelessly
to provide remediations within about 72 hours of knowing about
these attacks. We also acted very quickly to disclose these
events to the authorities, while providing remediations and
starting our investigations of what do we learn about this, who
may have done it, and what exactly happened in the process of
insertion into our Orion platform?
We believe the Orion platform was specifically targeted in
this nation-state operation to create a backdoor into the IT
environments of select customers, as my colleague Kevin noted,
as well. The threat actor did this by adding malicious code,
which we call ``Sunburst,'' to versions released between March
and June 2020. In other words, a three-month window was when
the code with the malicious Sunburst code was deployed.
I will note that this code has been removed and is no
longer an ongoing threat to the Orion platform. Additionally,
after extensive investigations, we have not found Sunburst in
our more than 70 non-Orion products.
Perhaps the most significant finding to date in our
investigation is what the threat actor used to inject Sunburst
into other Orion platforms. This injected tool, which we call
``Sunspot,'' was stealthily inserted into the automated build
processes of Orion and was designed to work behind the scenes.
Sunspot, which we discovered, poses a grave risk of automated
supply chain attacks through many software development
companies, since the software processes that SolarWinds uses is
common across the industry.
As part of our commitment to transparency, collaboration,
and timely communications, we immediately informed our
government partners and published our findings with the
intention that other software companies in the industry could
potentially use the tool to detect possible current and future
supply chain attacks within their software build processes.
We understand the gravity of the situation and are applying
our learnings of Sunspot and Sunburst and sharing this work
more broadly. Internally, we call these initiatives ``secure by
design.'' And it's premised on zero-trust principles and
developing a best-in-class secure software development model to
ensure our customers can have the utmost confidence in our
solutions.
We have published these details regarding our efforts in
various blog posts. But in summary, they are focused on three
primary areas:
The first is further securing our internal infrastructure.
The second is ensuring and expanding the security of our
build environments.
And third, ensuring the security and integrity of the
products we deliver.
Given our unique experience, we are committed to not only
leading the way with respect to secure software development,
but to share our learnings with the industry. While numerous
experts have commented on the difficulties that these nation-
state operations present to any company, we are embracing our
responsibility to being an active participant in helping
prevent these types of attacks. Everyone at SolarWinds is
committed to doing so. And we value the trust and confidence
our customers place in us.
Thank you again for your leadership in this very important
matter. We appreciate the opportunity to share our experiences
and our learnings. And I look forward to your questions.
[The prepared statement of Mr. Ramakrishna follows:]
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
Vice Chairman Rubio. Thank you. And for the Members who
haven't yet voted, I guess everybody's voted because
everybody's almost gone here.
So, Mr. Smith, thank you for being here. We appreciate it.
STATEMENT OF BRAD SMITH, PRESIDENT, MICROSOFT CORPORATION
Mr. Smith. Well thank you, Vice Chairman Rubio, and a huge
thank you to Chairman Warner for bringing us all together to
discuss what is obviously such an important issue to the
country, and indeed to the world. And I also just want to say
thank you to Kevin and Sudhakar. It took the leadership, and
I'll say even the courage, of companies like FireEye and
SolarWinds to step forward and share information. And it is
only through this kind of sharing of information that we will
get stronger to address this.
I think Kevin and Sudhakar have done an excellent job of
describing what happened. So I don't want to retrace the steps
that they so ably took. Let me talk about two other things.
First, what does this mean? And second, what should we do?
Well, roughly 90 days or so since we first heard about this
from Kevin's firm, from FireEye, I think we can step back and
start to think about what it means.
First, we're dealing with a very sophisticated adversary.
And Vice Chairman Rubio, I think your words of wisdom, of
caution, about avoiding certain labels are well put. But I do
think we can say this: at this stage, we've seen substantial
evidence that points to the Russian Foreign Intelligence Agency
and we have found no evidence that leads us anywhere else. So
we'll wait for the rest of the formal steps to be taken by the
government and others. But there's not a lot of suspense at
this moment in terms of what we're talking about.
It's very, very clear that this agency is very, very
sophisticated. And as Kevin noted, that has been true for a
long time. That is not new. But I think two other things are
new. The first is the scale of this attack, or hack, or
penetration, or whatever we should call it. At Microsoft, as we
worked with customers that had been impacted by this, we
stepped back and just analyzed all of the engineering steps
that we had seen. And we asked ourselves how many engineers did
we believe had worked on this collective effort? And the answer
we came to was at least 1,000. I should say at least 1,000 very
skilled, capable engineers.
So we haven't seen this kind of sophistication matched with
this kind of scale. But there's one other factor that I do
believe puts this in a different category from what we have
seen. And I think even with a thoughtful consideration, it is
appropriate to conclude even now: this was an act of
recklessness, in my opinion.
Why? Well, in part, I think Chairman Warner put it very
well. The world relies on the patching and updating of
software. We rely on it for everything. We rely on it not only
for the safety and health of our computers, we rely on it for
our physical infrastructure, for hospitals, and roads, and
airports, because they all run on software. To disrupt, to
damage, to tamper with that kind of software updating process
is, in my opinion, to tamper with what is in effect the digital
equivalent of our public health service. It puts the entire
world at greater risk. And it was done I think one must
acknowledge in a very indiscriminate way: to seek to plant
malware and distribute it to 18,000 organizations around the
world is in truth an act without clear analogy or precedent.
We've seen this done in Ukraine, but we haven't seen it
done quite like this. It's a little bit like a burglar who
wants to break into a single apartment but manages to turn off
the alarm system for every home and every building in the
entire city. Everybody's safety is put at risk. And that is
what we're grappling with here.
So what do we do?
I think we have to start by acknowledging and recognizing
we need to do a lot. We all need to do a lot. We need to do a
lot ourselves, and we need to do a lot together. Certainly, as
Sudhakar was mentioning, we need to focus on the integrity, the
protection of software build systems.
The International Data Corporation estimates that there
will be half a billion--500 million software apps--created in
the next three or four years. That's half a billion build
systems. And it's not just software companies; it's banks, it's
hospitals, it's governments. It's everyone that creates
software. There are new steps that we will need to take to
better secure and protect against the kind of attack that we
saw here.
Second, I think we have a lot of work still to do,
certainly across the United States, when it comes to the
modernization of our IT infrastructure and to the application
of IT best practices. At Microsoft, we can only see this attack
among our customers when it got to their use of their cloud
services and all of the attacks that took place, took place on
premise. Meaning a server that was in a server room or a closet
somewhere. And it points to the fact that until we modernize
and move more people to the cloud, we're going to be operating
with less visibility than we should.
Third, we do need to enhance the sharing of threat
intelligence. That's the term in the cybersecurity community
for information about attacks that people are seeing. And our
basic challenge today is that that information too often exists
in silos. It exists in silos in the government, exists in
different companies. It doesn't come together.
Fourth, I think because of that need, it is time not only
to talk about, but to also find a way to take action to impose
in an appropriate manner some kind of notification obligation
on entities in the private sector. And so of course you know,
it's not a typical step when somebody comes and says, ``place a
new law on me, put it on ourselves, put it on our customers,''
but I think it's the only way we're going to protect the
country. And I think it's the only way we're going to protect
the world.
And finally, I do believe it is time--it's maybe even
overdue time--for us to look at the rules of the road, the
norms and laws, that if not every government is prepared to
follow, at least the United States and our likeminded allies
are prepared to step up and defend. And among other things, to
say that this kind of tampering indiscriminately and
disproportionately with a software supply chain needs to be
off-limits. And there needs to be attribution and there needs
to be accountability, as officials in the White House are now
considering.
Finally, I'll close by addressing one question that Vice
Chairman Rubio, I think you posed. Who knows the entirety of
what happened here? One entity knows. It was the attacker. The
attacker knows everything they did. And right now the attacker
is the only one that knows everything they did. We have pieces.
We have pieces at Microsoft, SolarWinds, FireEye, CrowdStrike
others, we all have slices. People in the U.S. Government.
But we need to bring those slices together. And until we
do, we'll be living and working and defending on an uneven
playing field. That is not a recipe for success. But let's also
acknowledge one other thing: we know more than we did 100 days
ago. We are better informed, we are smarter, and we can turn
that knowledge into a resolve and action. That's what we need
to do. That's what I hope the Congress can do. That's what I
think the country and our allies need to do. If we use what we
have learned, we can better protect our future. Thank you.
[The prepared statement of Mr. Smith follows:]
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
Vice Chairman Rubio. Thank you. And finally Mr. Kurtz, I
believe, is on virtual?
Mr. Kurtz. Yes.
Vice Chairman Rubio: All right. Excellent.
STATEMENT OF GEORGE KURTZ, CO-FOUNDER AND CEO, CROWDSTRIKE
Mr. Kurtz. Thank you. Good afternoon, Chairman Warner,
Ranking Member Rubio, and Members of the Committee, thank you
for the opportunity to testify today.
During my three-decade career in cybersecurity, I have seen
first-hand the evolution of adversary techniques and have been
at the forefront of developing the solutions to thwart them. By
the time I co-authored the original edition of ``Hacking
Exposed'' in 1999, which later became the No. 1 selling book in
security, it was clear that organizations consistently failed
to adequately defend themselves.
When I co-founded CrowdStrike in 2011, it was based on a
conviction that the then-dominant approaches to security were
no match for adaptive and well-resourced adversaries. We set
out to elevate the industry's focus from stopping malware to
preventing breaches regardless of their source.
My testimony today is based on my prior and current
experiences protecting thousands of organizations across the
globe. I will begin by discussing our high-level findings in
the supply chain compromise and what lessons we might take away
from it.
In mid-December, SolarWinds engaged our professional
services team to perform incident response. Although we had not
worked with SolarWinds prior to this engagement, nor had they
used our software in the past, our teams collaborated
effectively to investigate the breach, enhance their security
posture, and share actionable intelligence with the entire
security community. With their encouragement, we continue to
coordinate and share findings with customers, industry
partners, and Federal agencies as appropriate.
Today, I would like to highlight a few significant
capabilities this particular threat actor exhibited. Notably,
the threat actor took advantage of systemic weaknesses in the
Windows authentication architecture, allowing it to move
laterally within the network as well as between the network and
the Cloud by creating false credentials, impersonating
legitimate users, and bypassing multi-factor authentication.
The threat actor modified code within the development
pipeline immediately prior to the software build, the final
stage before source code becomes software. The threat actor
leveraged unique IP addresses for commanding and controlling
infrastructure for each of its victims, complicating
investigations into the scope of the campaign, but used common
encryption methods and scrubbing techniques to avoid leaving
behind unique indicators.
The threat actor was selective in activating the backdoors
it implanted, purposefully selecting its victims from the wider
universe of those who were vulnerable. With respect to
attribution, CrowdStrike refers to this activity cluster behind
these events using the name ``StellarParticle.'' We are aware
that the U.S. Government has stated this threat actor is likely
of Russian origin. While we currently are unable to corroborate
that finding, we have no information to suggest it is
incorrect.
Regardless of attribution, there are a number of takeaways
from these events. This campaign, in particular, emphasized the
need to improve two important security disciplines: those
involving supply chains and those involving security
development.
StellarParticle is just the latest demonstration of supply
chain attacks as a threat factor. This follows a number of
previous high-impact campaigns where the origins of attack are
at the vendor level. With respect to software development, in
addition to ensuring secure coding practices and adequate code
review, organizations must protect the development platforms
and code repositories at least as well as their enterprise
environment.
Next, I would like to extend our considerations beyond this
particular campaign, and address six essential cybersecurity
concepts and emerging technologies.
The first is threat hunting. We know that the adversaries
periodically breach even very well-defended enterprises.
Properly trained and resourced defenders can find these bad
guys and thwart their goals.
The second concept is speed. Every second counts to stop
threat actors from achieving their objectives.
Third is the power of machine learning prevention. The core
state-of-the-art cybersecurity solution is the ability to
defeat novel threats. Machine learning and artificial
intelligence are essential.
Fourth is the need to enhance identity protection and
authentication. As organizations further embrace Cloud services
and work-from-anywhere models, enterprise boundaries have
continued to erode. This trend increases the risk of relying
upon traditional authentication methods and further weakens
legacy security technologies.
One of the most sophisticated aspects of the
StellarParticle campaign was how skillful the threat actor took
advantage of architectural limitations in Microsoft's Active
Directory Federation service. The Golden SAML attack allowed
them to jump from customer on-premise environments and into
Cloud and cloud applications, effectively bypassing multi-
factor authentication. This specific attack factor was
documented in 2017 and operates at Cloud-scale version of
similar identity-based attacks I originally wrote about in
1999.
Moving to the fifth concept, let's touch upon principles of
zero trust. Instead of authenticating to a network or device
once and having ready access to everything that's connected,
users must re-authenticate or otherwise establish permission
for each new device, or resource they wish to access. This
reduces or prevents lateral movement and privilege escalation.
Finally, I will touch upon something known as XDR, which
stands for ``extended detection and response.'' Security teams
demand contextual awareness and visibility from across their
entire environments, including within Cloud and ephemeral
workloads. As this Committee will appreciate, XDR generates
intelligence from what otherwise may be no more than
information overload. Each of these concepts applied equally to
all organizations and regardless of size is a must.
The last point is critical. Often, adversaries specifically
target smaller organizations as a means to a greater end. This
is part of the supply chain problem. We are proud that a number
of security companies, including CrowdStrike, are committed to
offering comprehensive, easy-to-use solutions and managed
security services to organizations of all sizes with varied
budgets. We also appreciate the need for improvements to
government cybersecurity.
Some of the most talented people in the field have worked,
or currently work, in government organizations. Unfortunately,
in many instances, our government colleagues are hobbled by
legacy technologies, programs, complex procurement processes,
or compliance obligations that detract from their core security
work.
I realized that I've described a set of enormous challenges
today. But I would like to close in a positive note. With
CrowdStrike's visibility into trillions of security events
across thousands of customers globally, I'm encouraged by the
silent victories the security community experiences every
second of every day. Defenders face an endless, evolving
threat. But I remain optimistic that working together, we can
prevail.
I hope my testimony today has offered some guidance on how
we can accomplish that shared goal. CrowdStrike has its sleeves
rolled up and is ready to continue to work with this Committee
and the greater security community to achieve success. I would
like to thank the Committee for inviting me to testify today
and for its leadership. I look forward to answering your
questions.
Thank you.
[The prepared statement of Mr. Kurtz follows:]
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
Vice Chairman Rubio. Thank you. Let me just begin, Mr.
Kurtz, by saying you've shown tremendous operational security
behavior there. That backdrop you have in that video, you could
be anywhere in the world.
[Laughter]
There's no way we could tell where you are just looking at
that. I'm going to get that backdrop. That's awesome.
So let me ask you and Mr. Mandia the same question. So let
me just say, you know, everyone is familiar--I think the
general public is familiar--with cyber-attacks and hacks. And
the general guidance everyone is given is, you know, don't put
some simple password like ``1234.'' They're easy to guess.
Because we've seen, you know, they can guess it. There's all
kinds of things out there that are also to be able to be
cracked by them.
Then there's the infamous--or the well-known--phishing
email. You get an email, you click on it, and they're in your
system. These are all hardware-type, sort of brute-force
intrusions.
For folks at home, who may watch this later or trying to
understand what the big deal about all this, this involves the
other thing we're told that we need to do all the time, which
is constantly upgrade your software. Every time you get a
software update, put it in because it's got new security
features. So these guys get into that software update and
you're basically in. It's almost like bringing them into your
system under the guise of protecting you.
And that's what we're dealing with here today. And this has
been a known vulnerability; something that people knew was a
theoretical possibility. My understanding is this is the first
time we've ever seen it at this scale or scope. And you'll
correct me in your answer if I'm wrong.
The question I would have for all of you, but really for
Mr. Mandia and Mr. Kurtz, is this a sophisticated technique?
This is not something that someone could do out of the basement
of their home. Or is this something that could eventually we
could see it become widespread? What level of sophistication do
you need to embed yourself in the software upgrade that
ultimately winds up in someone's system?
Mr. Mandia. You know, I'll jump on that first. And this was
a planned attack. This is not something done in somebody's
basement. There is somebody that thought about this. My gut is
this attack started somewhere where somebody said, ``If we
wanted to compromise these entities, where's the supply
chain?'' They probably had a list of five to ten companies.
SolarWinds was one of them. And they figured out who can we get
into? How do we do the implant?
When they got into SolarWinds, they didn't just rush right
to the implant. They wanted to make sure they could inject code
first in the build process. That was in October `19. Then four
to five months later, they have an implant. In that four to
five months, they designed an implant that masqueraded to look
like SolarWinds traffic. It was hard to pick up on the network.
It had things in it in the malware, and you know malware--a lot
of times you hear that word, you just shut down. And what's he
going to say next?
Well, this is what this malware did. It slept for the first
11 days after it was installed. So that if somebody did detect
its beacon going out, they wouldn't be able to associate a
beacon from the SolarWinds machine to the update they did
randomly 11 days sooner. Another thing it did is it looked for
nearly 50 different products and shut them down when it ran.
So people are like, why didn't anybody detect this implant?
It's because when it executed, it looked to see if
CrowdStrike's agent was on the endpoint, if FireEyes agent was
on the endpoint, if Windows Defender was on the endpoint, and
it shut it off. You don't make a backdoor as a bad guy as a
regular user. You make one as the root user, a system-level
backdoor.
Senator Rubio, there's no doubt in my mind this was
planned. It was an operation. There was a lot of people
involved. And the question really is: where's the next one? And
when are we going to find it?
Vice Chairman Rubio. Mr. Kurtz, I'm guessing you probably
agree with that assessment. So this is all without little doubt
a nation-state actor. It would take that level of
sophistication, is that right? Do both of you agree with that?
Mr. Mandia. I do.
Mr. Kurtz. Yes.
Vice Chairman Rubio. Who? Who is that nation-state actor?
Have you seen indications in it that tell you this is who we
believe it is?
Mr. Mandia. George, you want to go first on that one?
Mr. Kurtz. Well, when we look at the adversaries across
various nation-state actors, obviously, there's a level of
sophistication and tradecraft. And as I pointed out in my
testimony, the tradecraft and operational security was superb.
One of the things that we typically look for are things like
markings within tool chains. And what we saw, in particular
with the back door and the build process, was something we call
``code washing.'' And that was actually removing these tool
chains to these fingerprints that Kevin indicated that our
company and his company keep on file, right? So we know who the
bad guys are and how they operate.
In this particular case, these tool chains and the
infrastructure is very unique. What that means is they took
particular care to actually conceal their identity. And at the
highest level, we've attributed, as I said in my written and
verbal testimony, to a particular a cluster of activity. I know
the government has talked about Russia as being one of the
threat actors. You know, from our perspective, we have nothing
further to add to either confirm or deny that; but what I can
tell you, it is absolutely a sophisticated nation-state actor.
And as Kevin said, this took a lot of work. A lot of
planning went into this. And we think about how difficult
software is to build. Each one of my esteemed panelists are in
the software business. We know how hard it is to build
software, to get software working. And the idea to actually
inject something and have it all work without errors, and
without anyone actually seeing it is, again, superb tradecraft
and something you have to look at and say it's very novel in
its approach.
So I'll turn it back to Kevin and Brad, they probably have
some further thoughts on the attribution piece. But as I
mentioned, a sophisticated actor that we continue to track.
Mr. Mandia. And one thing unique to this case is when you
do the evidence on 1,000 cases a year and something doesn't
fall into a grouping, that's odd. That's peculiar. And then
when you go back 17 years of cases and digital fingerprints,
and it still doesn't fall into it. You start doing process of
elimination. You talk. You know, when we found the IP addresses
used to attack FireEye, we did go to partners like Microsoft,
we went to the U.S. Government--what I call ``ring zero.'' You
go to the intel agencies. Nobody had seen them in use before.
I'll just sum up my comments this way. We went through all
the forensics. It is not very consistent with cyber espionage
from China, North Korea, or Iran. And it is most consistent
with cyber espionage and behaviors we've seen out of Russia.
Chairman Warner. Appreciate those answers. I do think we've
had the previous Administration acknowledge likely Russian.
We've had testimony of the people in front of us. We've had the
current Administration acknowledge this source as well. I think
the sooner we make even more fulsome attribution, the better
because we need to call out our adversary--know we know who did
it--and plan an appropriate response.
And I agree with Senator Rubio: we don't even have our
language down entirely. Sometimes we know we know what
espionage is; we know what a denial of service attack would be
at the other end of the spectrum. Where this fits is, I think,
one ongoing question.
But I think we've oftentimes talked about this as ``the
SolarWinds hack.'' But there are other vectors. In my
understanding, the Wall Street Journal has reported that as
many as 30 percent of the victims were not accessed through
SolarWinds but by other means--and maybe this is best for
FireEye and CrowdStrike. And obviously, Microsoft would have a
view as well.
Why aren't we getting more details about the other vectors
that the adversary has entered? The other platforms that may
have been utilized? Again, I think this is reflective of the
point that since we are totally waiting on willing
participants, we could still be uninformed because other major
enterprises could be victims as well but had not chosen to come
forward. So how can we get a better handle on the non-
SolarWinds component of this attack?
Mr. Mandia. I can tell you this is--we're doing Stage Two
investigations right now for our customers. And the number one
other way we're seeing these attackers break in is what's
called ``password spraying.'' They're just popping passphrases
that they got from some breach over here and they're
recognized. If you think about it, all of us probably have
Amazon accounts; we have Microsoft accounts; we have Google--
whatever we're using. We have an email account and a passphrase
that we may use to access a whole bunch of applications. Some
of those third-party breaches make our user ID and passphrase
aware to the threat actor and then they try it on your
corporate networks.
So these aren't when I say password spraying, I almost feel
like, sir, they know some of these passphrases by the time they
show up and knock on your door. So you know, we have 3,300
employees at FireEye, I have to believe that some of them use
their FireEye.com email to access dozens, if not more, of the
apps on the internet. If any of those vendors get compromised
and their passphrase is compromised and they use the same
passphrase for Amazon.com as FireEye.com, we may have a
problem. So that's another attack that they use.
And here's the reality: this group has zero-day capability,
most likely. They're going to--how they get initial foothold to
them network will continue to change. But the way you know it's
them is when they come back in, they target the same things,
the same people, the same emails, similar documents, like they
have collection requirements.
Chairman Warner. To my question, Brad and George, if you
want to add to this. Again, we've talked about this as a
SolarWinds hack, but there are other vectors that they entered.
And, but for the fact that you came forward, both SolarWinds
and Microsoft came forward, there may be other very large
enterprises that have not been as forward leaning that may mean
this vulnerability still exists.
Mr. Smith. Yes. I would say, Mr. Chairman, a couple of
things. First, absolutely. There are more attack vectors and we
may never know exactly what the right number is.
I think the first question you're in effect asking is well,
why? And I would analogize to this: you know, this is like
finding someone in the building and now you have to figure out
how they got in. And you know, in our case at Microsoft, we
identified 60 customers where we figured out that they had
obtained, once they got in, typically, the password to
somebody, an IT administrator who could get them into, say,
something like Office 365. But in each instance, they got in on
premise, so it wasn't in our server or our service. And so we
need to work with somebody else to get to the bottom.
Chairman Warner. But doesn't that mean, though, that this
is not demonstrating a unique vulnerability that's in Microsoft
enterprise?
Mr. Smith. Oh absolutely.
Chairman Warner.--or Microsoft Cloud? But there may be
other brand-name players that may have been penetrated that
have not been as forthcoming who are leaving policymakers and
potentially customers in the dark. Is that true or not true?
Mr. Smith. It is absolutely true. I think it means two
things. One is yes, there's a variety of services. And there
are a lot of ways in. I also would just pick up on one of the
things that Kevin said, because he used a phrase that is
familiar to all of us in the cybersecurity community but
probably not to, say, somebody who is watching this hearing
from home--this notion of a ``password spray.''
Yes, I think in recent years, we've all sort of learned
that people may try to figure out our own individual password.
A password spray is when you use a single password, and you
apply it to a lot of accounts. For example, if I were to go
back to where I grew up near Green Bay, Wisconsin and have
1,000 email addresses from people in Green Bay, and I just
applied the password ``gopackgo,'' I'll bet dollars to
doughnuts, there's a Green Bay Packers fan who's using that
password. In fact, I'll bet there's more than one. And if I
find ten of those, 1,000, then I'm in and I can go from there.
So it just points to a variety of tactics. From the most
sophisticated really, when you're talking about disrupting a
supply chain, to the very broad that point to just a lot of
factors. We all need to keep learning about how to secure our
own email and other accounts.
Chairman Warner. Well, I'm going to move to Senator Cornyn.
But it does beg the question that Senator Rubio and I both
asked about when a large enterprise like Amazon is invited they
ought to be participating. There are other brand name known IT
and software and cloud services that may have been vulnerable
to this kind of incident as well, and their public and active
participation, we're going to make sure that takes place.
Senator Cornyn.
Senator Cornyn. Thank you, Mr. Chairman. And thanks to each
of you for testifying here today. I share the concern that has
been expressed that Amazon Web Services declined to
participate. I think that's a big mistake. It denies us a more
complete picture that we might otherwise have. And I hope they
will reconsider and cooperate with the Committee going forward.
Mr. Ramakrishna, thank you for talking with me yesterday.
And since you're headquartered in Austin, Texas, I took
particular note of that fact and appreciate that conversation.
I think one of the things we discussed is something that
Chairman Warner brought up and that is, even though SolarWinds
is the focus of what we're discussing here today, this is not
unique to SolarWinds. Correct?
Mr. Ramakrishna. Senator Cornyn, thank you for that
question. You're absolutely right. I'll elaborate on the
question that Senator Warner asked and tie the two comments
together here.
Supply-chain attacks are happening as we speak today,
independent of solo events. There was a report just two days
ago about a French company being hacked and it was dubbed as a
supply-chain attack.
As we discovered what we call Sunspot--the code, the
injected tool--and as we evaluated it, it is blindingly obvious
that that can be applied to any software development process,
which is the reason why we believe that dubbing it simply as a
solo-events hack is doing injustice to the broader software
community and giving us a false sense of security, possibly,
which is the reason why that--even though we are taking
corrective steps and learning from this experience--we consider
it our obligation to be a very active participant in this
endeavor to make us all more safe and secure by promptly
outlining our findings and communicating them with both our
government authorities as well as the industry.
Senator Cornyn. Our time is limited today and I hope at
some point we can talk about the attribution and the putting
the Russian intelligence services or whoever is responsible
here at risk because right now it seems to me that we are doing
a very bad job, generally speaking, of punishing the people who
are perpetrating these attacks.
But let me just ask you, at different times, I know there's
been legislation offered. Senator Collins and I discussed some
that she had introduced previously with Joe Lieberman, our
friend the former senator. It seems to me that there should be
an obligation of some sort, on the part of a victim of a cyber-
attack like this, to share what they know, what they've
learned, with the appropriate authorities. And I can only
imagine the chills that run up and down some people's backs
when I say that. I think about liability concerns, other
reputational risks, and the like.
But if we're going to get our arms around this at all, it
seems to me we need to know a lot more than we know under the
current practices in terms of the obligation of the victims to
step forward. Before I asked you about that and what that would
look like with perhaps with some sort of liability protection
associated with it. I will tell you that I'm a Member of the
Judiciary Committee, as Senator Feinstein is. And we actually
have designated seats on the Intelligence Committee from
certain authorizing committees like the Judiciary Committee.
And Mr. Smith, from your experience testifying there,
usually when we're talking about data breaches, people want to
talk about the company that allowed the data breach, how could
we sue them? And which is an entirely different perspective
than I think we need to have--a more complete approach to this
and one that does not treat the victim as the offender, but one
that works more cooperatively.
So what about some sort of mandatory disclosure obligation
that maybe would be coupled with some sort of liability
protection? I know in the intelligence field in the past, phone
companies that have cooperated with certain collection have
gotten liability protection as part of part of that.
Mr. Smith, do you have a view on that?
Mr. Smith. Yes, I do. I think the time has come to go in
that direction. I think Senator Collins was either ahead of her
time or the rest of us were behind our time. But either way, I
think we can find a way to move forward this year.
I could perhaps use the word notification rather than
disclosure. We should notify someone. We should notify. I think
a part of the U.S. Government that would be responsible for
aggregating threat intelligence and making sure that it is put
to good use to protect the country, and for that matter people
outside the country. I think we need to decide upon whom it
should be that that duty should fall on. It should certainly
fall on those of us in the tech sector who are in the business
of providing enterprise and other services.
I think it's not a bad idea to consider some kind of
liability protection. It will make people more comfortable with
doing this. This is about moving information fast to the right
place so it can be put to good use.
Senator Cornyn. Mr. Chairman, can I ask the other witnesses
if they have a different view or additional views on that
topic?
Mr. Mandia. No, I agree with it. And coming down to another
level of specificity to me, notification needs to be
confidential or you don't give organizations the capability to
prepare for those liabilities. And so we like the idea of you
can notify with threat intelligence that's actionable, you get
speed from that if it's confidential because you can have
threat data today and your arms around the incident three
months from now. And it's just too big of a gap to have a
disclosure law, and we're getting the intel three months to
five months too late.
So I like the idea of confidential threat intelligence
sharing to whatever agency has the means to push that out to
places, then disclosures that were a legal requirement to
inform those who are impacted. And you don't know that day one.
In FireEye's case, we were sharing intel really fast. And we
did not know what we had lost in our breach yet, but we knew
there was something different about it. So I just think that's
an extra detail. Get the intel out there quickly if it's
confidential.
Senator Cornyn. Mr. Chairman, my time is expired so I'll
yield back.
Chairman Warner. I think this is a subject that we're going
to come back around to and there are models out there. I don't
think our traditional reporting mechanisms necessarily work. So
the National Transportation Safety Board or others. Senator
Wyden's up next.
Senator Wyden. Thank you, Mr. Chairman.
The impression that the American people might get from this
hearing is that the hackers are such formidable adversaries
that there was nothing that the American government or our
biggest tech companies could have done to protect themselves.
My view is that message leads to privacy-violating laws and
billions of more taxpayer funds for cybersecurity.
Now, it might be embarrassing, but the first order of
business has to be identifying where well-known cybersecurity
measures could have mitigated the damage caused by the breach.
For example, there are concrete ways for the government to
improve its ability to identify hackers without resorting to
warrantless monitoring of the domestic internet.
So my first question is about properly configured
firewalls. Now the initial malware in SolarWinds' Orion
software was basically harmless. It was only after that malware
called home that the hackers took control and this is
consistent with what the Internal Revenue Service told me,
which is while the IRS installed Orion, their server was not
connected to the internet. And so the malware couldn't
communicate with the hackers. So this raises the question of
why other agencies didn't take steps to stop the malware from
calling home.
So my question will be for Mr. Ramakrishna, and I indicated
to your folks I was going to ask this. You stated that the
backdoor only worked if Orion had access to the Internet, which
was not required for Orion to operate. In your view, shouldn't
government agencies using Orion have installed it on servers
that were either completely disconnected from the internet or
were behind firewalls that blocked access to the outside world?
Mr. Ramakrishna. Thanks for the question, Senator Wyden. It
is true that the Orion platform software does not need
connectivity to the internet for it to perform its regular
duties, which could be network monitoring, system monitoring,
application monitoring on-premises of our customers.
Senator Wyden. It just seems to me--what I'm asking about
is network security 101 and any responsible organization
wouldn't allow software with this level of access to internal
systems to connect to the outside world, then you basically
said almost the same thing.
My question then, for all of you: is the idea that
organizations should use firewalls to control what parts of
their networks are connected to the outside world is not
exactly brand new. NSA recommends that organizations only allow
traffic that is required for operational tasks, all other
traffic ought to be denied. And NIST, the standards and
technology group, recommends that firewall policy should be
based on blocking all inbound and outbound traffic, with
exceptions made for desired traffic. So I would like to go down
the row and ask each one of you for a yes or no answer. Whether
you agree that the firewall advice would really offer a measure
of protection, from the NSA and NIST? Just yes or no. And if I
don't have my glasses on, maybe I can't see all the name tags,
but let's just go down the row.
Mr. Mandia. And I'm going to give you the ``it depends.''
The bottom line is this. We do over 600 red teams a year; a
firewall has never stopped one of them. You know, a firewall is
like having a gate guard outside of New York City apartment
building and they can recognize if you live there or not and
some attackers are perfectly disguised as someone who lives in
the building and walks right by the gate guard. In theory, it's
a sound thing. But it's academic in practice. It is
operationally cumbersome.
Senator Wyden. I don't want to use up all my time.
Mr. Mandia. Nope.
Senator Wyden. We'll say that your response to NSA and the
National Institute of Standards, ``it depends.'' Let's just go
down the row.
Mr. Ramakrishna. So my answer, Senator, is yes to standards
such as NIST 800-53 and others that define specific guidelines
and rules.
Senator Wyden. Very good.
Mr. Smith. I'm squarely in the ``it depends'' camp.
Senator Wyden. Okay.
Mr. Smith. For the same reasons that Kevin is.
Senator Wyden. Okay, I think we have one other person,
don't we?
Mr. Kurtz. Yes. And I would say firewalls help but are
insufficient. And, as Kevin said, and I would agree with him,
there isn't a breach that we've investigated that the company
didn't have a firewall or even legacy antivirus. So when you
look at the capabilities of a firewall, they're needed. But
certainly they're not the be-all and end-all. And generally,
they're a speed bump on the information superhighway for the
bad guys.
Senator Wyden. I'm going to close and my colleagues are all
waiting. The bottom line for me is that multiple agencies were
still breached under your watch by hackers exploiting
techniques that experts had warned about for years. So in the
days ahead, it's going to be critical that you give this
Committee assurances that spending billions of dollars more
after there weren't steps to prevent a disaster attack,
disastrous attacks, that experts had been warning about was a
good investment. So that discussion is something we'll have to
continue.
Thank you, Mr. Chairman.
Chairman Warner. Is Senator Cotton on the web?
Senator Cotton. Yes, I am here. So thank you, Mr. Chairman.
Gentlemen, thank you for your appearance today.
I want to start, Mr. Smith, with you. Microsoft has said
some of its source code was stolen. Does that present future
security risks? And if so, what are you doing to mitigate it at
Microsoft?
Mr. Smith. Well, the short story is, our security system
does not depend on the secrecy of our source code. I mean, we
live in a world where probably there's more source code by tech
companies published in open-source form than there is that's
not published. And at Microsoft, our source code is accessible
to every Microsoft employee. It's not considered to be a
particular secret, and our entire threat and security model is
based on the premise that there will be times when people will
have access to source code.
Do we like the fact that this actor saw it? Absolutely not.
But we do not believe that it undermines or threatens our
ability to keep our customers or ourselves secure. We will, by
the way, as we always do, to answer the rest of your question,
Senator, we'll ask ourselves, what do we change? It's not
apparent to me that I need to have access to our source code.
It's not apparent to me that our Senate lobbyists need to have
access to our source code. So we may have fewer people that
have access to source code in the future, but it's really not
at all the heart or center of what we're focused on here.
Senator Cotton. Okay. Mr. Ramakrishna, approximately 30
percent of the victims of the attack were not using SolarWinds
software. What do you think that tells us about the nature of
the attack and what victims were targeted and how they were
targeted?
Mr. Ramakrishna. Senator Cotton, thanks for the question.
This is referring to the Wall Street Journal report, I believe.
Thirty percent is an approximation. As best as we know, there
are many different types of attacks and different types of
threat vectors. We are not a security company per se. So we
wouldn't have detailed information about those types of threat
vectors. But what I can share is the discoveries that we have
made with Sunspot can apply to any supply chain out there, and
it's quite possible that there are active supply chain attacks
ongoing right now, some of which we may know about, some of
which are yet to be discovered.
Senator Cotton. Mr. Mandia or Mr. Kurtz, would you like to
respond as well?
Mr. Mandia. George, go ahead.
Mr. Kurtz. Well you know, again, when you look at the
supply chain of attacks here, it is very difficult obviously to
identify these things. And when we look at the adversary's
capabilities, and we look at what was actually done, as we
talked about earlier, it's not an easy problem to solve. And
you know, from my perspective, it's one that we have to come
together, we have to continue to share intelligence and
information. And we have to realize that there are many other
techniques and actors that are out there. And when you look at
the overall landscape you know, 30 percent weren't from
SolarWinds. This isn't a surprise.
Over the last year, we stopped 75,000 breaches that are in
process, and probably a quarter of them were nation-states. So
this happens every day from every nation-state actor, every e-
crime actor, and their variety of tools and different
techniques and tasking orders that are out there. So it's an
ongoing effort and I wish there was a silver bullet. There
isn't. But I think a big part of this is exposing the
techniques and just how prevalent these attacks are to the
American people. So that we can do something about it. And we
can come together as a group, both in the technology field as
well as in government.
Mr. Mandia. And Senator Cotton, this is Kevin Mandia
speaking. To me, the attacker did the SolarWinds implant.
They've already moved on to whatever's next. We've got to go
find it. This attacker, you know, maybe their pencil's down for
a few months. But the reality is, they're going to come back.
They're going to be an ever-present offense that we have to
play defense against, and how they break in will always evolve.
And all we can do is close the window and close the security
gap better next time.
Senator Cotton. Okay, then one final question. I think I'll
direct this toward Mr. Mandia and Mr. Kurtz again.
To what extent do we think this was designed toward what we
might call ``collection'' in the intelligence world; simply
trying to collect information to learn more about America's
intentions, plans, capabilities, or what you might call a
``covert action'' in the intelligence world, say, sabotage of
public utilities or military applications or so far, so forth?
Or could it be both?
Mr. Mandia. Yes, George, I'll jump first. Just because we
got to see what they did first-hand when they broke in us. The
reality is this. They were very focused. They had specific
individuals that they targeted, they had keyword searches that
they did when they broke in. So this was not a group that
operated like a tank through a cornfield. They had a plan, they
had collection requirements, and to some extent, I would say
they were disciplined and focused on those collection
requirements. Not efficient with tradition to just grab
whatever they could grab.
Mr. Kurtz. And just to add what Kevin says, I think it's
important to realize that as technology companies, we all
leverage big data. The adversary does as well. And while
they're collecting this information, they're also storing it,
they're indexing it, and they have the ability to go back to
it. So if a new order comes in--a new, specific order to target
a company, target a government organization--they can look for
that access, they can look at what's already been collected,
they could leverage that.
The second piece of this is in the early days it was
network exploration. Then it turned into data exfiltration. And
then it turned into data destruction and an impact, right? So
certainly, when you have this level of access, you can collect
data. If you start impacting systems, it's a pretty good way to
get caught.
So could it be turned into that? Absolutely. But in
general, what we've seen is collection, and that simply goes
into the big machine, the big apparatus to be used again for
further missions.
Chairman Warner. Senator Bennet.
Senator Bennet. Thank you. Thank you all for being here
today. Thank you, Mr. Chairman, for holding this hearing.
I wanted to get some clarification along the same lines as
Senator Cotton, actually. Mr. Mandia, maybe I'll start with you
just for people at home who don't understand how, you know,
what they've read is this is a SolarWinds----
Mr. Mandia. Right.
Senator Bennet [continuing]. investigation. That's what
they imagine what we're dealing with here. That's clearly not
the case, based on what we saw in the Wall Street Journal
report with only 30 percent of the folks who somehow got pulled
into this who had no SolarWinds----
Mr. Mandia. Right.
Senator Bennet [continuing]. connection. Help us understand
what that means in terms of the ongoing nature of this. You
know, when you say they put their pencils down, have they
really put their pencils down? Or are they out there working
their pencils and we just can't see it because we don't know?
You started out at the beginning saying maybe they went
through a list of, like, five to ten vendors and said these are
the likely ways in and we'll pick this one. But clearly they
picked other ways in as well. So I'm just trying to get a sense
of the full scope of how.
Mr. Mandia. Yes. And you know when I said pencils down, I
mean they were so successful on this breach they probably got a
few days off because they collected so much information.
Senator Bennet. Right. So they're waving the flag.
Mr. Mandia. Basically, right now, there's such vigilance in
the security community they're not going to spoiler their
latest technique right now. We're all looking for it. So
they're pencils down for the next great implant.
Senator Bennet. Right
Mr. Mandia. I would be if I were them. Every intrusion
starts with initial access. How an attacker gets that varies.
When we say the ``SolarWinds implant,'' that was the initial
access for a campaign this group did from March of last year
until about December of last year when we started detecting it.
But this group's been around for a decade or more.
Different people go in and out of that group probably. We're
probably responding to the kids of the people I responded to in
the 90's when this group was active. So the bottom line, how
they gain a foothold in a victim network, SolarWinds was a way.
They will always have other ways.
This is a group that hacks for a living. And then when they
break in, what they do after they break in really doesn't
change that much. They target specific people, primarily folks,
at least in our case, that did work with the government. They
target government projects. They target things that are
responsive to key words. We respond to a lot of threat groups
that when they break in, you can tell they broke in to make
money or they broke in and there's a manual review where
somebody's literally going through every file alphabetically on
a desktop.
These folks have economy of movement. If they broke into
your machine, Sir, they string search it, they find responsive
documents, they get out of Dodge. They have an economy that
shows they're professional. And that doesn't change. So if they
broke in yesterday via SolarWinds and we patched that and fixed
it like we have, tomorrow they're going to have something else.
And they're going to try to come back through whatever doorway
they can find.
Senator Bennet. And tomorrow they might be looking for
something else, too.
Mr. Mandia. The good news is usually they aren't. But
you're exactly right. The collection requirements could change.
We've identified this group because they'd break into a
company. And then we'd get them out. And if they got back in,
they're after the same sort of things and that's one of the
indicators; it's still them. So their tools and tactics can
change but a lot of what they target does not.
Senator Bennet. And I'm happy for anybody to jump in if
you'd like to. But with the rest of my time--there was some
discussion earlier--sorry, we were in and out going to votes
and things--about reasons they might not want to actually
destroy data or destroy systems because they might get detected
if they do that. Whereas if they stay in there and they don't
mess around with stuff--. But if they wanted to really do
mayhem in our systems, what would that look like? What does our
worst nightmare look like?
Mr. Smith?
Mr. Smith. Well I'd offer a few quick thoughts. First
building on your answering your prior question and then
answering this one. I would just add that in addition to
targets in the United States we have identified targets in
Mexico, Canada, the U.K., Belgium, Spain, Israel, and the UAE.
So it was broader and international in scope.
Second, 82 percent of the 60 target victims that we
identified were outside government. So I think there's an
aspect to your question well: who else were they targeting and
why? And I would say that there are at least two other reasons
that we would surmise, two motives if you will. Sometimes if
you're going after a government agency that has very good
security practices in place, you might look for a third party
that might have an individual who was given password and
network access to, say, the government's network.
And you might hope that that third party organization--
maybe it was a computer service provider, maybe it was an
accounting or consulting firm, maybe it was a think tank that
was working on a contract--you would hope that maybe they had
lesser security in place and that's why you would start there.
It's a vehicle to get somewhere else.
And then I do think at times they target tech companies in
part to understand how technology works. But frankly it's
perhaps in the category of counter-intelligence. Every day we
are looking--you heard the reference to threat hunting--we are
looking for evidence of this organization engaged in attacks. I
think they want to know what we know about them and what their
methods are.
But then I do think your other question is so important,
because at the end of the day, what do you do once you're
inside? Do you just collect information? Or do you wreak havoc?
Well, this agency typically collects information. But we know
exactly what havoc looks like. All you have to do is look at a
day in June in 2017 when another part of the Russian government
used exactly the same technique. A supply-chain disruption with
a Ukrainian accounting software program. That, too, was an
update. It turned off, damaged, 10 percent of that country's
computers. ATMs stopped working. Grocery stores stopped the
capacity to take credit cards. Television news stations went
off the air. That is what havoc looks like and that is what we
need to be prepared to defend against as well.
Chairman Warner. We're going to move to Senator Heinrich.
What Mr. Smith just referenced was what we refer to as
NotPetya----
Mr. Smith. NotPetya.
Chairman Warner [continuing]. but was that the potential
existed at--even this attack.
Senator Heinrich.
Senator Heinrich. Thank you, Chairman.
So if I have this right, a nation-state actor that is in
all likelihood the Russians, used U.S. software and then
command and control servers in U.S. data centers to conduct
this attack. And I think the fact that this attack was launched
from within the U.S. is potentially a really important part of
this story. Advanced persistent threat actors know that the NSA
is prohibited from surveilling domestic computer networks. So
it makes sense for them to circumvent U.S. surveillance
whenever possible.
For any of you: do you believe that the adversary launched
the attack from U.S. servers in a deliberate effort to avoid
surveillance?
Mr. Smith. I think it was sort of an I.Q. test. We can't
know exactly what they thought but it looks like they passed
the I.Q. test. They figured out that it would be more effective
and less likely to be detected if it was launched from a U.S.
data center.
Senator Heinrich. Anyone else want to add to that or in
agreement?
Mr. Ramakrishna. No, I think I would agree.
Mr. Mandia. I agree with those statements.
Mr. Kurtz. Yeah.
Senator Heinrich. For Mr. Smith, while the focus continues
to be on how the private sector shares information with the
government, we also want to ensure that the government is doing
enough to share information with the private sector. Mr. Smith,
you expressed concerns in a blog following the SolarWinds
attack about the Federal Government's insistence on restricting
through its contracts our ability to let even one part of the
Federal Government know that the other part has been attacked.
Can you elaborate a little bit about this comment? And in
what ways could the Cybersecurity Information Sharing Act of
2015 be improved to ensure that that is possible?
Mr. Smith. Yeah, it was, I have to admit, one of the things
I found surprising and a bit frustrating for us. Because the
first thing we do when we identify a customer who's been
attacked is we let them know. We notify each and every
customer. It was immediately apparent to us that it was
important not just to let an individual department or agency of
the U.S. Government know but to make sure that there was some
central part of the government that would have this information
about the government as a whole.
And what we found was that our contracts prohibited us from
telling any other part of the U.S. Government. So we would
basically go to each agency and say can you please tell so and
so in this other place? And the good news is, people did. They
acted quickly. But it does not strike me as the type of
practice that makes a lot of sense for the future. So there is
an opportunity for reform.
Senator Heinrich. Probably not the most efficient way to
make sure information travels quickly.
Mr. Smith. It doesn't seem like it's consistent with the
year 2021 and technology.
Senator Heinrich. Mr. Mandia. In your statement for the
record you said that victims of crime are the first to know
when they've been violated. But in a case like this, only a few
government agencies and a handful of security or other private
companies are in a position to be the first to know. I agree
that doesn't seem right. You suggested that a small group of
cyber first responders could prevent or mitigate the impact of
cyber incidents through sharing information quickly and
confidentially. That's a very intriguing idea.
Can you describe how you think that would work?
Mr. Mandia. You bet. There's got to be a way for folks who
are responding to breaches to share data quickly to protect the
Nation, protect industries. And that would require (A) defining
what is a first responder. And I think it's pretty simple. If
you're trying to figure out what happened to unauthorized or
unlawful access to a network, you're a first responder.
And if you do that for other companies beside yourself,
you're a first responder. And first responders should have an
obligation to share threat intelligence to some government
agencies so that, without worrying about liabilities and
disclosures, we're getting intel into people's hands to figure
out what to do about it. Right now the unfortunate reality is,
a lot of times when you share threat intel, it's just a public
disclosure.
And it makes people weary to do so and we slow down the
process. So that's what I mean by that. I could articulate
more. But first responders know who they are. And I think it's
easy to define. We have many laws that define certain
categories like Internet provider. We need to know. If you're a
first responder, you're obligated to get threat intel into the
bucket so we can protect the Nation.
Senator Heinrich. No, I think that's very helpful. When you
detected this activity were you obligated to tell the U.S.
Government? Why or why not? And was that obligation legal or
moral?
Mr. Mandia. We notified the government customers we had
before we went public with the breach. And we found out later
based on contractual reviews who we had to notify or not. But
the reality is the minute we had a breach, I was talking to
what I call ring zero. The intelligence community, law
enforcement--you don't want to get email when you don't know if
your email's secure. So the reality is, I would say on the
record, I think we told every government customer we had that
we had a problem, period, before we even went public.
Senator Heinrich. Thank you.
Chairman Warner. Senator Heinrich, both the points that
this was launched from domestic servers and the lack of
information sharing were really important points. And now one
of our new Members joining us remotely, Senator Casey. Your
first intelligence questions.
Senator Casey. Mr. Chairman, thanks very much. And thanks
for the welcome to the Committee. And I appreciate the
testimony of our witnesses.
I wanted to start with the role of the Federal Government
here. And maybe we'll just go down the panel starting with Mr.
Mandia to give us an assessment of the Federal Government's
response to date. And then I'll move to a second question
regarding what we do going forward.
So Mr. Mandia, why don't we start with you?
Mr. Mandia. Without a doubt, the number one thing the
Federal Government can do that the private sector cannot do is
impose risk and repercussions to the adversaries. Period. So
we've got to have some kind of public doctrine to Mr. Smith's
idea of rules of the road. We've got to communicate where
there's a red line. I know we think it's a tough thing to
define, and we admire the problem, but we've got to come up
with what's tolerable, not tolerable, communicate it so we
don't see a gradual escalation. But to impose risk and
repercussions is the purview of the government.
And the second biggest thing is the attribution. The
government's in the best place to get attribution the most
right. So those two things without--, and by the way, there is
no risk of repercussions if you don't know who did it. So those
are the two things that I'd firmly place into--the government
is best suited to do that. And I'll leave it to some of the
other witnesses on the government's role and how to safeguard
the private sector and work with the private sector, because I
know we have a lot of great ideas.
Mr. Ramakrishna. Senator, I'll keep it quick. And the
suggestion I would make is to leverage some of the
recommendations in the Solarium Commission report and have a
single entity in the government, that public sector entity
where all private sector entities can go and communicate with
and communicate to and have the responsibility of that agency
to then disseminate it to every relevant party.
To date, we feel like we have to communicate with multiple
agencies and sometimes that doesn't help us from a speed and
agility perspective.
Mr. Smith. Let me if I could point to two successes that I
think are worth building on. First, I think it's really notable
that the NSA in December published a circular that described in
technical detail the nature of the attack, how people could
identify whether they were victimized by it, and how they could
protect themselves from it.
And I think that it was extremely well done from a
technical and cyber-security perspective and it was published
to the world. And I think that the NSA and the U.S. Government
did the world a great service. And that's the kind of thing
that we should aspire to have our government do in the future.
Second, last week I thought Anne Neuberger at the White
House in a press conference took a similarly critical step. She
shared to all of us information that frankly none of us had;
namely, that the government had identified roughly 100 private
companies and nine Federal agencies that had been impacted by
this incident. And that tells me that there is now at work real
efforts to consolidate this information across the different
parts of the government. So that's encouraging.
She's also indicated that her work is far from done.
They're focused on next steps that need to be taken in a
variety of ways. But I do think this is a very important
moment. The government can speak authoritatively about the
nature of attacks and how to protect ourselves, and the
government can speak authoritatively about the scope that has
happened.
Mr. Kurtz. I would also just like to jump on this. I would
also say that CISA's done a lot of work here--a lot of great
work. Has put out some, I think, interesting information,
indicators, some scripts that helped the public. And while
we're talking about the government and we're talking about
corporations, there's a whole host of smaller entities that are
out there that have no real way to protect themselves. So I
think, to Kevin's point, as a first responder--which we are,
which he is and others--it's important that we have a single
source that we can go to.
We're doing incident response not only for big companies
and governments but for many small companies. We need to be
able to share this information as quickly as we can without
impacting the customer themselves.
Senator Casey. Mr. Kurtz, I'll end with you, just with one
follow-up. When you go through what I think were six proposals
or recommendations, what do you think is the most urgent, at
least as it relates to the Federal Government?
Mr. Kurtz. Well I think there's probably a couple things.
But certainly threat hunting is one of the biggest areas. And
as we've talked about before, it's a sophisticated actor. With
enough time and effort, they're going to go get into somewhere.
And we always make the distinction between an incident and a
breach.
There isn't a major company or a government on this planet
that hasn't had an incident, and they will continue to have
incidents. But you want to be able to identify those very
quickly so they don't turn into breaches. And these are like
sentries that are looking for the bad guys. They're looking for
these indicators, they're looking for these back doors. And
it's a tall task. I pointed out things like machine learning
and artificial intelligence.
All of my fellow witnesses are working on these sort of
techniques as well as us. And that's a big part of a go-forward
strategy. Figure out what's there, use the technology to our
advantage.
Senator Casey. Thanks, Mr. Chairman.
Chairman Warner. Thank you, Bob.
Senator Burr.
Senator Burr. Thanks very much.
Let me thank all of our panelists today for your
willingness to be here and, more importantly, for your
knowledge in this.
I've got to reflect for just a minute and I'm going to do
it even though Senator Wyden left, because I strongly disagree
with what he implied. He implied that because NSA and this--
said that proper hygiene is a firewall that should be something
that should be mandated and everybody should use it and that
would solve our problem.
And the three of you that deal specifically in searching
out intrusions said no, no, no. No. It's helpful, but it
doesn't solve it. And to suggest that in the day of COVID that
you've got a choice between washing your hands, hand sanitizer,
and masks, but if you choose just to wash your hand and not do
the other two, you're never going to get COVID. It's ludicrous.
And I want the record to show that what the response from those
who track these was listen, this is sophisticated. They're way
past this.
So yeah, that's a good thing for companies to adhere to.
But don't think that that's going to solve it with the
adversaries we're up against right now. I want to turn to
George just real quick, and I want to go on Senator Heinrich's
question. In the SolarWinds attack, Amazon Web Services hosted
most of the secondary command and control nodes. And all of
AWS's infrastructure was inside the United States.
Now I feel like having a cyber-attack deja vu here, whether
it's Russian hack of DNC in 2016, the North Korea and Sony
hack, or current supply chain hacks, we constantly see foreign
actors exploiting domestic infrastructure for the command and
control to hide the nefarious traffic in legitimate traffic.
Here's the problem. Given the legal restrictions on the
intelligence community, we don't have the ability to surveil
the domestic infrastructure. So what should the U.S. Government
role be in identifying these types of attacks?
Mr. Kurtz. Well I think it's working with providers like
AWS, working with folks like Microsoft, working with others,
CrowdStrike and FireEye and others. Because when you look at
this particular attack, why did they use U.S. infrastructure?
Because they just wanted to blend in. Right? And I can tell you
there's a ton of attacks that we look at that use foreign
infrastructure, that use bulletproof hosting, which is you know
the ability to anonymize and pay for hosting and
infrastructure. And we know who they are and we tend to look
for those bad actors. Right?
So if you can use infrastructure that looks legitimate no
matter whose infrastructure it is, you're going to blend in and
make it harder. And this particular attack was insidious just
the way it communicated and the protocols it used. It looked
like legitimate traffic going to infrastructure that you know
is normal. But that's why it's important, when you think about
these attacks, to have visibility. I talked about threat
hunting, to have visibility on the end points, because that's
at the tip of the spear.
And these network access devices are just speed bumps, as I
talked about earlier. What's actually happening is on the end
point. What's actually happening is beaconing out. And you have
to have visibility. And you have to collaboratively work with
the private sector and the public sector together. And I think
that's the only way we're going to solve it.
Senator Burr. Kevin, I want to turn to you and I want to
ask for a little more specific statement. You alluded to the
fact that this is not going to stop without a government
dictate that says: here's what we're going to do. Let me just
ask it this way. Will it stop if they pay no price for what
they do?
Mr. Mandia. No. I think if you don't impose risks or
repercussions we're all--you know I've used this analogy for so
long, you'll get how long I've used it. We're all playing
goalie and we're taking slap shots from Wayne Gretzky. I mean,
the puck's going to get in the net sooner or later. And that's
what's happening in cyber space right now. Folks are taking
slap shots and literally there is no risk or repercussion to
the folks doing it.
So we're all fighting a losing battle over time.
Senator Burr. So Sudhakar, as it relates to SolarWinds, can
you build software today without the risk of what happened?
Mr. Ramakrishna. Thanks for the question, Senator. We've
done extensive analysis with our partners at CrowdStrike and
KPMG of our entire build environment and entire infrastructure.
And we've seen no evidence of the threat actor in our
environment or in our build systems and our products.
We've also learned from this experience and applied them to
what I've been describing as ``secure by design.'' One of the
key tenants of that is to evolve software development life
cycles to secure development life cycles. And related to that,
we've come up with a methodology where source code doesn't get
built in traditional ways and we use parallel build systems
with different people accessing them, with different access
types.
And we correlate the output of them across those three to
significantly reduce the potential for a threat actor to
consistently compromise every one of our build systems at the
same time. That is the level of effort our teams are going
through to build safe and secure solutions. Which I hope will
be a model for others.
Senator Burr. Are these practices that you're sharing with
others in the industry?
Mr. Ramakrishna. We are completely committed to doing it,
and we are doing it as we do it.
Senator Burr. Thank you, Mr. Chairman.
Chairman Warner. I would simply want a quick comment that I
agree with my friend, Senator Burr's comment that a firewall
alone cannot keep out a sophisticated actor. But it doesn't
mean the corollary--and I had conversations with the CEO of
SolarWinds on this--that just because it's a sophisticated
actor then that means that you shouldn't do good cyber hygiene.
Mr. Ramakrishna. Absolutely.
Chairman Warner. It is not an either/or.
Senator Burr. No, I agree with you totally. I think what
we're hearing--and maybe we're just not saying it right--is
that even with the best cyber hygiene, even with the best
protocols in place because of how good and persistent and how
much money a nation-state has like Russia, we're susceptible
Mr. Ramakrishna. Yes.
Senator Burr. You know the puck is going to get in the
goal, as Kevin said, and if we've missed anything and you've
got something that assures us the puck won't get in the goal,
then here or privately share what it is so that we can begin to
pursue and flesh out that type of policy.
Chairman Warner. But the problem is we may not know the
puck was even in the goal. But if you've got good cyber-
hygiene, chances are you will discover the puck at some point.
We'll continue that hockey analogy. Now as we move to our next
new Committee Member, Senator Gillibrand. Welcome to the
Committee and your first Intelligence Committee questions.
Senator Gillibrand. Thank you, Mr. Chairman.
I want to follow-up on knowing whether you've had the puck
go into the goal. One of you said that the hack that shut down
CrowdStrike and other defense software--and it affected them
before they could start working. So why do these programs--why
was there no alarm, and how were they shut down?
And related, why were there no alarms in the SolarWinds and
anti-virus software logs which should have shown the unusual
behavior, access, or other traces of unauthorized access?
Mr. Kurtz. Yeah, so this is George. Maybe I can take that.
There were probably multiple, dozen software technologies that
were targeted to actually be shut down. In our particular case,
you can think about the camera. You know if someone came up to
a camera and smashed the camera you'd actually see what they
did. And our particular software has a level of monitoring
where if someone tries to tamper with it we would actually be
able to see that.
And in fact, you'd actually have to reboot the system. As
Kevin mentioned, pretty persistent where it waited and kind of
did things you know over a number of days.
Senator Gillibrand. But there was nothing? There was no
alarm? Even the after the 11 days?
Mr. Kurtz. Well once you have admin access on a particular
system, if you're shutting it down you know you can pretty much
do anything you want on it. And that's just a function of how
the operating system works. And what we focus on, and I talked
about this in my written testimony, is no silent failure. And
we've designed our system that even if there is a failure
somewhere along which we call the kill chain, this attack
sequence, we're still going to detect something down the road.
And I think this is really important when I talked about
threat hunting. You may not catch the initial stage of the
attack, but you're looking to catch it along the way, and
you're looking to do that with speed. If someone's going to rob
a bank there's only so many ways to rob a bank. You've got to
get there; you got to get the money; you have to get out.
Right? What car they drive, what weapon they use, how they do
it doesn't really matter.
So as long as you can identify the chain of activity, which
is really important, you can stop these breaches. And that's
why we stopped over 75,000 breaches just last year. So it's
obviously a challenging problem but that's why when we look at
this, it's really about risk mitigation; using multiple
technologies and having visibility across your network.
Senator Gillibrand. Alright. Mr. Smith, I think you said on
``60 Minutes'' that there were more than 1,000 developers
working on writing this malicious code. Why do you know that or
how do you know that? And with a group that big, if it is based
in Russia, how come we didn't detect it or see it before?
Mr. Smith. Well there was a lot more than a single piece of
malicious code that was written. And so one of the things we
analyze: what was done from an engineering perspective on each
of these second stage attacks that Kevin was talking about
before. And in essence what we saw was a very elaborate and
patient and persistent set of work. They entered. Then, as they
were in through that back door, they in effect opened a window.
They then swept up behind themselves. They closed the back
door. They used that window. They identified accounts. They
were able for the most part to really rely on stealing
passwords and accessing credentials, especially where
credentials were not well secured, meaning they weren't stored
on a hardware dongle or they weren't stored in the cloud. But
they were able to get people's passwords. They were then very
persistent in using that at what we call elevated network
privilege to work across a network.
And we just were able to look at our estimate of how much
work went into each of these individual attacks, how many
attacks there appear to be in total, and we asked our
engineering teams: these threat hunters that you were hearing
about before--what do you think is on the other side of this?
And that was their estimate. And we have asked around with
others: does this estimate seem off base? And no one has
suggested it is.
Senator Gillibrand. Let me ask Mr. Ramakrishna a final
question. So the Wall Street Journal reported that there was as
many as a third of the victims were accessed by means other
than SolarWinds. However, those access vectors, including TTPs
and infrastructure, have not been made public. Why is that and
do you expect to release the full details of the other access
vectors? And what other ways did the cyber actors use to gain
access to victims?
Mr. Ramakrishna. Senator that's a very good question. We,
as a manufacturer or producer of IT management tools, do not
have the security capabilities to be able to investigate other
threat vectors. And that's where the colleagues at this witness
table with me will be able to help us and the broader industry
identify those threat vectors. On our part, what we have
committed to doing and continue to do is sharing everything
that we are finding.
And the significant discovery that I mentioned about
Sunspot is one key element of eliminating threat vectors. As we
learn some new vectors ourselves at SolarWinds, we are
committed to sharing those. But I think the broader security
industry will take the mantle on that.
Senator Gillibrand. Thank you, Mr. Chairman.
Chairman Warner. Thank you.
Senator Collins.
Senator Collins. Thank you, Mr. Chairman.
Mr. Chairman, let me echo the concerns that Senator Cornyn
and you have raised about Amazon not being present. I think
they have an obligation to cooperate with this inquiry and I
hope they will voluntarily do so. If they don't, I think we
should look at next steps.
I also want to thank both of you for mentioning legislation
that Senator Joe Lieberman and I authored and brought to the
Senate floor back in 2012, which was defeated largely due to
the lobbying efforts of a large business group. And the irony
is that this grit business group, at the time that they were
lobbying against mandatory reporting, was itself being hacked,
which I found out about from the FBI later. I take no pleasure
in that. I think that shows how widespread this problem is.
I want to follow-up on two issues. One is the issue of
reporting. Mr. Mandia, we know from the White House report and
from our own briefings that the hackers did gain access to at
least nine Federal agency networks. Yet the U.S. Government
learned of this cyber-attack through FireEye. So, in your
judgment is it reasonable for us to assume that our government
probably would still be in the dark about the Russians or
whoever the hackers were--likely the Russians--being on our
systems if it were not for your voluntary disclosure?
Mr. Mandia. I think over time I believe we would have
uncovered this. I think there's a lot of activity that out of
context nobody could put their finger on the larger problem.
The minute we found the implant and the minute we disclosed
what had happened, it connected a lot of dots for a lot of
folks. All I can tell you is when I spoke to the government
about this basically as it was unfolding for us nobody was
surprised as to what I was telling them.
So I think we could sense there was behavior on certain
networks that wasn't right. But we couldn't find the cause
until we put it all together.
Senator Collins. But none of those agencies had taken
actions until you contacted them. Is that accurate?
Mr. Mandia. I don't know what actions they may or may not
have taken.
Senator Collins. The second issue that I want to talk about
is our critical infrastructure: 85 percent of the critical
infrastructure in this country is owned by the private sector,
and that's one reason that I think mandatory reporting is so
critical. We have only to look at what happened in Texas from
natural causes to imagine the damage that could be done by a
cyberattack.
Now it's my understanding that our government has assessed
that this operation was focused on stealing information rather
than taking down networks. But how difficult--and I would like
to ask the entire panel this--how difficult would it have been
for the hackers to disrupt these networks if they wanted to?
Why don't we start with you, Mr. Mandia, and just go down
the panel.
Mr. Mandia. Two comments, Ma'am, very quickly on that.
Disruption would have been easier than what they did. They had
focused, disciplined data theft. It's easier to just delete
everything in a blunt force trauma and see what happens, which
other actors have done. But what I've observed this group do--
and I think this is an important detail--a lot of times when
you break into a network you get what's called the domain admin
account. And just use that to grab everything.
It's the keys to everything. It's the master key in the
hotel. What this group actually did is they wanted to break
into room 404. They got a room key that only worked for room
404. Then they got the room key for 407. They actually did more
work than what it would have taken to go destructive. But
obviously, they had the access required and the capability
required should they have wanted to be destructive to have done
so.
Senator Collins. Thank you.
Mr. Ramakrishna. Senator Collins, I would agree with that
based on my studies and research of other similar breaches in
other countries, such as in Ukraine.
Senator Collins. Thank you. Mr. Smith.
Mr. Smith. I would agree as well. And I'd just highlight a
couple of aspects that I think are important. First, especially
when we're talking about publicly owned critical infrastructure
in this country, a lot of it is too old. It needs to be
modernized. And I'll just point to one example was some of our
work with a state agency responsible for public health.
When our consultants went in to work with them they found
that the manual for the software was more than 20 years old,
meaning the software itself was more than 20 years old. So and
that's why you see these ransomware attacks which need to
connect with this. They so often target municipalities, we've
seen Baltimore, we've seen New Orleans. They target hospitals.
So that that is in critical need of improvement. I do think
the other thing that is really worth thinking about more
broadly for the whole Committee is I don't think we can secure
the country without investing in more cybersecurity people for
the country. There's really a critical shortage nationwide of
cyber security professionals and I think we can put our
community and technical colleges to work in part to get more
people into public agencies, into small businesses and others.
We are doing a lot to try to publish information. At
Microsoft we have published 31 blogs since we learned about
SolarWinds you know from FireEye. But there's just not enough
people in many places to read them and act on them.
Senator Collins. Thank you. I know my time has expired.
Maybe Mr. Kurtz could respond for the record.
Chairman Warner. Okay. And I don't.
Mr. Kurtz. Sure, thank you.
Chairman Warner. I'd just simply mention as well, Senator
Collins, you appropriately pointed out the failure to report on
the private sector side. There's no obligation on the public
sector side.
Senator Collins. Right. Well part of the problem is that
there should be this exchange.
Chairman Warner. Yep.
Senator Collins. Of information that's not occurring now on
either side.
Chairman Warner. Absolutely. Senator Blunt.
Senator Blunt. Thank you, Chairman. Mr. Mandia, did you
feel when you found this problem in your system did you think
there was a legal obligation to report it to anybody?
Mr. Mandia. Yeah, we had third party counsel involved. We
did not have a legal requirement at least based on the legal
advice that I got to disclose at the time that we did. So we
did so based on we're a security company, we work to a higher
order. Yeah, it's all built on trust. And you got to report.
Senator Blunt. And Mr. Ramakrishna, what did you think
there was a legal obligation to report this when you found out
about it to the government or anybody else?
Mr. Ramakrishna. Senator, I was not with the company when
this particular incident happened.
Senator Blunt. Got it.
Mr. Ramakrishna. So I will take it on record and come back
to you with exactly what happened at that point in time.
Senator Blunt. And Mr. Smith, from your testimony I think
it was point four in the things we should do though there was
some element of it in point three. It's your view that there
should be a requirement now that these kinds of things be
reported. Is that right?
Mr. Smith. Yes. And I think we should build on the
conversation we had here. But you know, we too concluded we had
no legal obligation to report. But I think we had a duty
nonetheless first of all to each customer, second of all to the
U.S. Government and third of all to the public which is why we
published those 31 blogs.
Senator Blunt. So do you think we should create a legal
obligation for you to report if you're aware of a problem like
this?
Mr. Smith. I do. I think we need to be thoughtful, tailor
it, make it confidential. But we will not secure this country
without that kind of sharing of information.
Senator Blunt. So on that topic and we'll just stay with
you and then work our way back down. On that topic, you know
these companies. All four of the people represented here have
great expertise and great resources which I'm sure you've used
a lot of to figure out how they got there, if you figured that
out, how long they've been there. How would we expect a normal
person that does business with your companies to be able to do
that on their own? And maybe, Mr. Smith, that goes to your view
we need more cyber expertise.
But how would we expect a regular company, unlike these
companies at the table today, to have any sense whether anybody
was in their system or not?
Mr. Smith. Well the first thing I would say is I think it's
a decision for you to make as to whom you want this obligation
to apply. You know certainly it should apply to tech companies.
Should it apply to every customer of a tech company? I think
that is a separate question. Second, of course people cannot
report something they're not aware of. Our customers who use
our cloud services know when we are able to detect that they
are being breached in the cloud or they're being attacked
because we tell them. And so we let them know.
Now ironically one of the episodes we've learned from this
time was in some instances we called people on the phone and we
said we're from Microsoft and we want you to know you're being
attacked and they're like yeah, right and they hung up. They
didn't believe that this big company was calling this small
business. But that is our job, our responsibility I think--to
help our customers. And we can provide information to the
government, or in certain instances others could as well.
Are you going to ask every small business to do that? It's
probably not necessary for this purpose.
Senator Blunt. Yeah. I think if we move forward on that
discussion some helpful thoughts from all of you about when
that obligation to report. If you've called a customer and said
you've been hacked, is there an obligation you should have then
to report? We could work on that.
Mr. Mandia, how long do you think this had been in your
system whenever you found it? And I know it was the two
telephone verification seeing that extra verifier in there that
was the tip off.
Mr. Mandia. Right.
Senator Blunt. How long do you think it had been there?
Mr. Mandia. Well a couple ways to answer that. Bottom line
it was a couple months from initial access but the attacker
wasn't alive every single day. I think, in other words, they
were on our system for maybe three hours in one day, a week
would go by, couple hours on another day. We weren't a full-
time job for the intruders that broke into us. Because they had
broken into 60 plus other organizations if not 100. So we did
get their attention and there's several days of activities
before we detected them.
But over time it was several months.
Senator Blunt. And of course you'd contend that very few
companies would be better prepared than yours to find out.
Mr. Mandia. Right.
Senator Blunt. If somebody's in your system because that's
what you do.
Mr. Mandia. Right.
Senator Blunt. Mr. Kurtz, you mentioned on the bank robbery
example I think it was something like you get there, you get
in, you get the money, you get out. It seems to me that in this
intrusion they weren't all that interested in getting out. What
do you think that means? That they would get there and just
hang around, as Mr. Mandia said, and do something and a week
later might look and do something else?
What kind of hacker is that? What are they positioning
themselves to do? Clearly not to shut down your system at that
moment. But why do you think they were persistent in this, what
I think, is a relatively different way than we might have
anticipated?
Mr. Kurtz. Well this is indicative of a nation-state actor
and it's in their interest to maintain persistence. If they
were collecting data, they want to continue to collect
information over a period of time. If the campaign as was
pointed out this is the way it works, right? You've got
different mission objectives and campaigns. If the campaign is
over, they certainly would want to remove their tool so they
weren't found by companies like CrowdStrike and FireEye and
Microsoft and others.
So it's in their best interest to maintain the persistence
because you never know what they're going to need. And one of
the things that I really want to point out and how this works
in practice is that when you get into a system when an
adversary gets in they don't necessarily know what they're
going to find. And then they find some interesting tools, they
find some emails that may lead them to another company they can
compromise.
And it's a massive spider web of interrelated entities and
information that they have to collect. And when you draw that
out, if you can imagine a crime scene where you kind of put
everything on the bulletin board and you start connecting the
dots between the actors, that's what it's like for the victims.
And from one company to the next company to the next company to
a government agency, they can all be connected together with
some of these campaigns.
And there's no reason for them to get out unless that
campaign is over. And certainly unless they want to remove that
malware and their tools which typical which we've seen in this
particular case cause they didn't want anyone else to find
them.
Chairman Warner. Senator King.
Senator Blunt. Thank you. Thank you, Mr. Chairman.
Senator King. Thank you, Mr. Chairman. Excellent, excellent
hearing. A lot of important points. A couple just I want to
emphasize. Mr. Mandia, I'll give you another analogy to use as
well as Wayne Gretzky, and that is if all we ever did was lock
our windows and robbers never had to worry about going to jail,
there'd be a lot more robbers. I think deterrence is one of the
most important parts of a national strategy and frankly it's
one that really hasn't been very well developed in this
country. And as you pointed out I think it has to be declared.
It has to be public. The adversary has to know what the
capabilities are and that costs will be imposed. That leads me
to a second point that I think Brad Smith mentioned but we
didn't really develop. And that is the importance of
internationalizing this problem and that is working with our
allies because we're not the only ones. I think you mentioned
there was an attack on a French company by this same group.
And to the extent that we have the international community
and the establishment of some kind of international norms, red
lines, guardrails, whatever you want to call them then things
like sanctions are much more effective. I want the hackers to
not be able to go to Monte Carlo as well as Miami. So
deterrence is key. And the international piece of it is also
important.
And then the final thing that I think has come out today
very clearly is the importance of some kind of joint
collaborative environment where there can be an easy and quick
and efficient flow of information. Liability protection may be
necessary. Anonymizing the data may be necessary. But some kind
of mandatory breach notification is also part of this package.
All of these bills, all of these ideas by the way are part
of the work that we're going to be doing on the solarium this
year and I look forward to working with the Members of this
Committee on things like the collaborative environment, breach
notification, the international aspect of it.
Let me ask a specific question. Mr. Mandia, do we need a
central Federal attribution office? It strikes me that
attribution the FBI has a piece of it, the NSA has a piece of
it, maybe the CIA, and whomever somewhere else. Attribution is
key. You can't do deterrence, you can't respond unless you have
attribution.
Should there be a central attribution department, if you
will, that could act quickly and do attribution more
efficiently than is the case today?
Mr. Mandia. Well I can say this, sir. I don't know if it
needs to be a single committee or single agency. But
attribution is critical and all that you know any time I get to
advise a head of state it's very simple. If you don't know who
did it, you can't do anything about it. So I would argue it's
one of the most critical issues we have to solve as a Nation is
we got to know who did every breach.
I think that those data points will automatically come from
multiple agencies with multiple missions and areas of
responsibility. And then bring it to domestic challenges like
the SolarWinds breach and all the liabilities hitting
companies. It is helpful and maybe it's CISA, maybe it's the
FBI, but it is helpful that most organizations recognize that
we are expected to defend ourselves from the drive by shootings
on the information highway.
But we shouldn't have to defend ourselves from the SVR. I
mean that doesn't seem like a benchmark that this Nation should
set for every small to medium sized company out there that you
need to defend yourself from a foreign intelligence service
trying to hack you. So I would say this. Categorical
attribution for these companies that do disclose is very
helpful for those companies. So in other words, if there was
public attribution that said SolarWinds was compromised by a
nation-state, good enough.
Because it takes the wind out of the sails of all the
plaintiff lawsuits that we all get when we get compromised and
we tell the world about it. Thank you.
Senator King. Thank you. And it seems to me that moving on,
we clearly ought to do attribution better. The other piece
that's come out today is, and Senator Burr mentioned this, is
gaps in our authority. The NSA and the CIA cannot spy on
Americans. They cannot watch what's going on in American
networks. That sort of leaves the FBI which is really a law
enforcement agency as the intelligence agency for domestic
cyberattacks.
It seems to me that we need to think of how these
authorities fit together and what the gaps are to be sure that
we have the tools to protect ourselves. Not that we want to spy
on Americans, but we also want to be able to protect Americans.
Mr. Mandia, your thoughts on that?
Mr. Mandia. I do believe there's got to be a way for the
U.S. Government when we need to mobilize to understand how we
can do it domestically. And the example I've always used, sir,
is very simple. If the intelligence community recognizes
there's going to be an attack on Wilkes Barre hospital this
Friday by the best hacking group on the planet, we'd just start
moving the patients out of the hospital. And that seems like we
can do better than that as a Nation.
We ought to be able to impose the risk profiles that we
need to and project our capability domestically when we need
to. And right now, I don't see the ability to do that.
Chairman Warner. Senator Feinstein.
Senator King. Appreciate it.
Chairman Warner. Dianne.
Senator Feinstein. Oh, excuse me. Thank you very much, Mr.
Chairman. I'm looking at this worldwide threat assessment of
the United States intelligence community. It was done by Dan
Coates, a former colleague of ours when he was Director of
National Intelligence. And it's deeply concerning to me because
it points out really the seriousness of this thing and the
impact of it, the length of time eight months that it went on.
Nine Federal departments, over 100 companies, and we don't
know what, at least I don't, what the Russians took. And it
seems to me to have this kind of situation out there and I've
been on this Committee for a long time. And just have a hearing
and not do anything about it. And know that we know now that
there is this kind of vulnerability available.
So let me begin with you, Mr. Mandia. You're a Californian.
What do you advise this Senate to do about this?
Mr. Mandia. Yeah there's several recommendations. I still
believe it is critical we find a way to have a centralized
agency that we can report threat intelligence to confidentially
and that if you're designated as a first responder in cyber
space, whether private or public sector, you report to that
agency. That means we get the intelligence into the hands of
people that can take actionable steps way faster than
disclosure of incidents which just takes too long.
To Brad Smith's point and you have those six bullet points.
I think it's actually five bullet points. And they're all
right. It's what we should do. I'm specifically talking about
the threat intelligence sharing. Let's up it a notch. Let's say
you have to if you're a first responder.
Senator Feinstein. How would you do that? When you say up
it a notch, what specifically would you do?
Mr. Mandia.--Have legislation that defines who a first
responder is. That if you respond to unlawful, unacceptable, or
unauthorized access to networks as a business and you see
certain things that threat intelligence and we know what it is
in the community that needs to be shared with a specific
agency. Confidentially shared so that you don't have to know
who the victims are because the victims have liabilities that
make them delay.
They'll do months of investigation before they would
disclose everything. But we want to get the intel faster and
into the hands of the right people more quickly. I do believe
it needs to be a central agency inside the government. You
can't go to three or four, you've got to pick one. And that if
we're responding, we got to let you know here's what's going
on.
Senator Feinstein. And this would be private sector as well
as government sector?
Mr. Mandia. Yes.
Senator Feinstein. So it would be a comprehensive bill that
essentially would set a kind of operational protocol that has
to be followed.
Mr. Mandia. It it's similar to operating agreements for all
the folks who accept credit card use. The Visa operating
agreements. You literally have 24 hours to start sharing
information regardless once you know. And it's not based on all
the things that you may have lost. You've got to get the intel
into the hands of the folks that can start safeguarding the
Nation far faster than what we're doing today.
Senator Feinstein. Could I ask the other two witnesses to
reflect on what Mr. Mandia has said?
Mr. Ramakrishna. Senator, I agree with that single agency
to report to and the public private partnership. Clearly that
is one of our recommendations as well and that will be
consistent with the goal of having speed and agility in
responding to these types of events.
As you noted, some of these have gone for too long and
we've lost time in detecting the perpetrators and taking
corrective steps.
Senator Feinstein. Mr.
Mr. Ramakrishna. Additionally, I would recommend in the
context of public and private partnerships standards, such as
NIST, and procedures, such as CMMC, can be improved with better
collaboration, better transparency between private and public
to evolve those from what are today compliance based
methodologies to focusing on excellence.
That is where I think Brad's idea of having a larger pool
of STEM based focused education as well as specific cyber
security education will come in handy.
Senator Feinstein. Thank you.
Mr. Ramakrishna. And then the last thing I would say in the
context of coming out and identifying breaches and encouraging
people even to come out and identifying the breaches there was
a concept of liability protection that was discussed. There is
significant brand reputation that people are worried about as
well. And in the context of this broader work, I'd recommend
that we address those as well which are not strictly liability
but broader than that.
Senator Feinstein. Thank you. Mr. Smith.
Mr. Smith. Yeah, I would endorse everything that you just
heard. I would add in the areas of rules of the road I think
there are three areas that are just clearly ripe for this
Committee and others to say are off limits. The patching and
updating of software should be off limits, certainly when an
and a this disproportionate.
Senator Feinstein. Well wait, the patching and off date--
Mr. Smith. And updating.
Senator Feinstein. Updating of software.
Mr. Smith. Yeah. Yeah that was.
Senator Feinstein. Should be off limits to whom?
Mr. Smith. For these types of nation-state attacks. That
would be the first thing. The second would be cyberattacks on
hospitals and healthcare providers. Vaccine distributors. I
mean there's been a ground swell of both concern about what
we've seen in the last year and attacks on that sector. And the
third is attacks on our electoral infrastructure. On voting, on
the tabulation of votes, on voter registration rolls.
And I think there's a ready vehicle that's ripe because 75
governments, but not our own, have already signed the Paris
Call for Trust and Security in Cyberspace. More than 1,000
private organizations, including my own, has signed that. And I
hope this White House and this State Department will act on
that. The consensus is there if U.S. leadership can help push
it across the finish line.
Senator Feinstein. Mr. Mandia, would you just reflect for a
moment?
Chairman Warner. Can we.
Senator Feinstein. Oh, just one question.
Chairman Warner. Yeah. We've gone through the five minutes
so we're.
Senator Feinstein. Okay. Thank you.
Chairman Warner. Senator Sasse.
Senator Sasse. Thank you, Chairman. And thank you to all
four of you for being here. This has been a very constructive
hearing. I would just associate myself with the many comments
of folks expressing frustration that Amazon isn't here. I think
they should be and I think we should pursue whatever is
necessary. Hopefully they'll do that voluntarily.
I'd also like to underscore a few things that were said
along the way by Angus King about some of the deterrence
objectives of the Cyber Solarium Commission. He and Mike
Gallagher, House Member from Wisconsin, have invested tons of
time. I was a commissioner but those two guys co-chaired it.
There's a whole bunch of work to be done about breach
notification that they've been thinking on in addition to some
of the work that Susan Collins has done.
Mr. Mandia, I know you answered it multiple times through
the course of the last three hours but your summary five
minutes ago about the need for a central single repository at
the Federal Government for these breach notifications I think
was very succinct and compelling, so thank you for that.
Mr. Smith, when I came back from voting a little while ago
I think I heard you say, I was just walking into the room, that
you thought there were a thousand highly trained engineers
involved in planning this attack. Did I hear you right?
Mr. Smith. That that is our best estimate, yes.
Senator Sasse. And could you kind of give us a level set of
other attacks or espionage efforts in the past? Like, say the
CCP's OPM hack. Do we have any theory of how many people would
have been involved in that, trained folks?
Mr. Smith. Well, I don't. But you certainly didn't need an
engineering group of similar magnitude to steal data. You
really need to then think about how to use that data which is
probably some combination of engineering and artificial
intelligence. And you know, I do think as we scan the horizon
around the world, we are seeing variation in tactics. You know
we are seeing in one part of the world more of this I'll call
it engineering intensive effort to you know penetrate
individual organizations with great patience and persistence.
And then extract data on an ongoing basis as you would if
you are a foreign intelligence agency. You know in another part
of the world you're probably seeing you know more collection of
very large data sets. And in all probability the way one would
make use of those data sets is to aggregate them and use
artificial intelligence machine learning you know to start to
knit them together and then say use them for disinformation.
And so you know as we look at the world, we have espionage
threats. We have disinformation threats. And then ultimately we
always have the threat we were talking about before of actually
damaging a society or a country as we saw in Ukraine.
Senator Sasse. Right. Very helpful. Is there any equivalent
breaches that you can think of that would have had this scale
of human capital involved in planning them?
Mr. Smith. I can't think of a similar operation that we
have seen that would have similar human scale, no.
Senator Sasse. So this is arguably the largest planned
cyberattack ever?
Mr. Smith. I haven't seen anything larger. I think we were
having a good conversation before about what label precisely to
attach to this. But it was a very it's the largest and most
sophisticated operation of this sort of that we've seen.
Senator Sasse. So going back to some of Martin Heinrich's
questioning and then Chairman Senator Burr's follow-up on the
same thought. It'd be useful for those of us who are not
technologists to hear the three of you kind of talk about the
difference between the design flaws, not that anybody is
particularly responsible inside the U.S. Government for having
failed to detect this, because it's a new kind of attack. But
design versus execution flaws given Martin's points about the
NSA being prohibited from surveilling domestic systems.
Who should in our current structure have found this
earlier? Again I'm not looking for you to blame cast, I'm
looking at us as the Congress to recognize that we have an IC
that is not structurally prepared to respond to something like
this. When your greatest capabilities are at the NSA and
they're prohibited from surveilling the systems where they
would detect it, the FBI is chiefly responsible for law
enforcement investigations after the fact. Structurally, we're
not prepared to defend against this, are we?
Mr. Mandia. I guess I'll jump in on that one. There's no
question you have to have private and public partnership in it.
Period. When you look at critical infrastructure and who's
running it. I want to be clear though, why people didn't detect
this, the Achilles heel, is because the front door was locked.
So the attackers had to break in to SolarWinds, implant
something, we still don't know how they broke in to SolarWinds
that I'm aware of. And this is probably the last avenue in
cyber security.
Now we know you've got to worry about supply chain risk and
you're going to see the elevation in security there. So the
reason everybody didn't detect this right away is over the last
30 years in cyber security you used to be able to drive through
the front door. And we kind of closed that and then it became
spear fishing and tailored attacks against individuals. And we
got really good at that. And now they went to the supply chain.
And it was inevitable. We knew they'd get there. Apparently
it takes something like this for us to really decide to up the
game.
Senator Sasse. But if we think about how many questions
you've had to answer today about reporting requirements, you
also had a sense, Mr. Smith, you said something about the
reporting prohibition on you going from one government agency
to the next. How long was that delay in our structure? If you
had been able to notify everybody once you knew once your four
companies knew what you knew how much faster would it have been
than it was in the situation where you actually had
prohibitions on information sharing intra-USG?
Mr. Smith. Well I think in this instance when we spoke to
officials in one agency typically within a day I think they
spoke to officials in another. So they understood and they were
fast moving. I do think that one of the challenges in this
space is the nature of all threat intelligence, whether it's
cyber-based or physically based, is that it's always about
connecting dots. So the more dots you have, the more likely you
are to see a pattern and reach a conclusion.
And so I think one of the challenges here is that the dots
are so spread out, they're in a variety of different private
companies and they always will be. And then they're spread out
across different parts of the public sector as well. So this
notion of aggregating them is key. The one thing that we
haven't talked about though that I would add to this is there
should be some level of information sharing in an appropriate
way back to those of us in the private sector that really are
first responders.
You know I look at the Microsoft threat intelligence center
and we are able to aggregate all of this data across our
services. And you heard from CrowdStrike or FireEye and they do
similar things. But we too are operating with imperfect
information when we don't have access to this knowledge. So
that's another key question I think that really merits
consideration.
Senator Sasse. I'm over time but thank you to all four of
you and I'll follow-up with some of you for more as well.
Thanks Chairman.
Chairman Warner. Well I'm I want to thank all the witnesses
but I also want to make sure people have hung in if Senator
Blunt, Senator Burr, Senator Rubio I've got one more question
but I want to see if Senator Blunt do you have anything else?
Senator Blunt. No, sir.
Chairman Warner. And do you have Richard? Marco?
Vice Chairman Rubio. I mean I think one of the things about
this is you know corporations and government we do we trust a
number of software vendors now to run programs remotely in the
cloud. They even allow them access to our networks to provide
updates to help perform better, for safety and so forth. So
this is really is not just a national security thing, it really
goes at the heart of how we conduct business across multiple
sectors.
By the way, I would venture to guess that most companies,
mid-sized companies and above, have no idea how many different
pieces of software they don't know what their own inventory is
of what they're running. And so it would be now's probably a
good time to have someone in charge of knowing that in case
something like this comes up.
I have three quick questions. On SolarWinds, I'm not sure
I've heard yet, do we do we know what the initial entry point
into the network was?
Mr. Ramakrishna. Senator, our investigation on how which is
initial entry point is still active at this point. We have had
a number of hypotheses over the last couple of months working
with our investigation partners. We've been able to narrow them
down now to about three, which I hope will help us conclude to
one. But just the nature of the investigation is we are still
sifting through terabytes of data to figure out if we can
pinpoint that particular one.
Vice Chairman Rubio. So is TeamCity produced by JetBrains
any indication they could be one potentially?
Mr. Ramakrishna. Senator, TeamCity is a tool used in the
build processes by us and many other companies out there. We,
to date, have no evidence that it was the backdoor used to get
into SolarWinds. Although we haven't eliminated that
possibility, we haven't proven it.
Vice Chairman Rubio. And for on Microsoft, as far back as
2017 that the forged identity credentialing you were aware of
that vulnerability as far back as when were you aware of that
and what was done from the point you knew moving forward on the
to address that?
Mr. Smith. Well the forged identity refers to an industry
standard, SAML, a markup language. It's an industry standard
that is supported by a wide variety of products including our
own. Actually as we investigated this incident, we found that
it was relevant in only 15 percent of the cases and in those 15
percent, in every instance you know this tool was used to in
effect add access capability only after the actor was in the
network, had obtained access with what we call elevated
privileges, and was able to move around and then use this.
But to answer your question this particular standard, the
SAML standard, was created in 2007. So long before 2017 we and
many other companies in the industry have been working to move
people towards a more modern authentication standard. And there
has been one that has been around since 2012. More broadly,
independent of what security standard you use for this kind of
authentication the thing that we have been advising our
customers and the practice that we have been following
ourselves is really to do the following.
One, move your authentication service into the cloud.
Number two, secure all of your devices. We have a service
called Intune that does that. Number three, you know, make sure
you're using multi-factor authentication. Number four, have
what's called least privileged access meaning don't give
individuals access to the entire network or to be able to do
things that they don't need to do. And number five, use a
contemporary or a modern anti-virus or anti-malware service
like Windows Defender.
And the reality is any organization that did all five of
those things, if it was breached it in all likelihood suffered
almost no damage.
Vice Chairman Rubio. Because it would have been contained
or whatever in the individual compartment they entered. Okay.
Mr. Smith. Absolutely. Yeah. And these are five practices
that the world knows about and this goes back I think to this
point that we do need more cyber security professionals to work
with more organizations. And obviously it's incumbent on us. We
every day we're working to make it easier for our customers to
deploy all of this stuff.
Vice Chairman Rubio. Yeah, and I think that just touches on
the notion that even if you can't prevent the attack or the
intrusion you can mitigate its impact if you can do some of
these things that you've discussed. Mr. Mandia, this is my last
question. We talked about notification. Not disclosure but
notification. And this seems to me that and you may have some
thoughts on this what is the threshold for that?
Is it a major breach? Is it breach? Is it breaches that
have indications of nation-state involvement?
Mr. Mandia. It's hard.
Vice Chairman Rubio. Because I think every day someone's
getting pinged by somebody. So what's
Mr. Mandia. I agree and you don't want to spread fear,
uncertainty, and doubt by folks who can't do a proper
investigation or lack the expertise or quite frankly they don't
know what really happened but they disclose so fast that they
do create an unnecessary fear. That is the hardest part because
every disclosures going to have some discretion built into it.
And that's why when I'm talking about notification I'm trying
to there's public disclosure and legal disclosure.
I'm trying to separate that, and Brad Smith did in his
testimony very well, to threat intelligence sharing. And I'm
more talking about threat intel, get it out there fast, get it
out there confidentially so you have the time to figure out the
threshold for disclosure. But that's a lot of work because I
think it depends on the industry you're in whether you should
disclose. I think it there's contract law that'll apply. You
should disclose to your customers at least that are impacted.
But I still feel disclosure is always going to be based on
the impact of a breach which requires investigation.
Chairman Warner. Well let me thank all of the panel and
George who's online. We actually had well Senator Risch didn't
want to ask a question. We had full participation from the
Committee and that is a sometimes rare occurrence. I take away
four issues that I'd like for the record since it's been a long
afternoon.
The fact that Smith said this was potentially one of the
most serious breaches he's seen. We know that it got into Mr.
Ramakrishna's 18,000 customers and while they chose to only
exploit 100 plus the fact that this could have been used not
for exploitation and ex-filtration of information but could
have been turned they were inside as I think Mr. Mandia so
eloquently put it could have been exponentially worse and I
think we need to recognize the seriousness of that.
Number two and I think Senator Rubio was raising this as
well that while it was a top tier nation-state with their A
team and it may be hard for any individual company or public
enterprise to totally block that out, we can't default to
security fatalism. We've got to at least raise the cost for our
adversaries. And whether the items that Mr. Smith just
enumerated in terms of better protections even if they get in
we can find them and raise their costs if we think through
this.
Mr. Smith commented on this but I would like the rest of
you for the record to comment on this, this idea around norms
and international norms. I use the analogy that in warfare you
don't bomb the ambulance. Well should we try to get to a point
that you don't bomb the patch? Or that you don't hit the
hospital literally? Or the electoral systems? How do we move
toward that system of norms?
And finally I think there is a real growing sense and I
hear this from industry as well that we need some level of at
least information sharing around on a mandatory basis. Again, I
want to compliment Kevin's company and Kevin personally for
coming forward because but for that effort we might still be,
this might still be ongoing. And how we think about that what
that reporting to or whom it rep we report to mechanism, I
think it's going to require some new creation.
And while I am very open to some level of liability
protection, I'm not interested in a liability protection that
excuses the kind of sloppy behavior for example that took place
in Equifax where they didn't even do the basic cyber hygiene.
That if you report that you should not be free of your
responsibility if you have been a sloppy player.
So I think there are models. There's FinCEN in the
financial sector, there's the National Transportation Safety
Board which may be an even better example. I think Mr. Mandia
pointed out within the credit card arena there is this
information sharing. Some I know have been thinking about the
idea that the cloud service providers, the large enterprises,
the first responders a la CrowdStrike and FireEye maybe being
co-located at some location with parts of the government.
Because this notion of getting the information out real
time, that's not going to happen with all due respect to the
great talents that are at the FBI that's not going to happen
when it goes to the FBI and they're just not in the business of
information sharing. It frankly is probably not going to happen
even though CISA's skills continue to be upgraded. We're going
to need to think about a different model and I challenge all of
you to come forward with that.
I think there's a great deal of appetite bipartisan
appetite. I think we realize how serious we were and we
potentially dodged a much more serious bullet. And really
appreciate all of your participation and it's been constantly
mentioned those companies who chose not to participate so far
we're going to give them another chance and hopefully they will
recognize they have that kind of public service obligation that
is reflected by the testimony today.
With that the hearing is in adjourned. Thank you.
[Whereupon at 12:07 p.m. the hearing was adjourned.]
Supplemental Material
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
[all]
WASHINGTON – Today, Senate Select Committee on Intelligence Chairman Mark R. Warner (D-VA) and Vice Chairman Marco...
Washington, D.C. — Senate Select Committee on Intelligence Acting Chairman Marco Rubio (R-FL) and Vice Chairman Mark...
~ On the release of Volume 5 of Senate Intelligence Committee’s bipartisan Russia report ~ WASHINGTON – U.S....