According to the news outlet, the hackers were able to use an already-reported hack of the US State Department as a springboard for a subsequent attack against the White House.
As a consequence, the hackers are said to have been able to access “sensitive information such as real-time non-public details of the president’s schedule” and planned policy announcements on a network the White House considers unclassified.
A classified computer system which is supposed to be used for all sensitive White House communications is run separately, and is said by officials not to have been breached.
Although the White House may currently be nervous of directly accusing the Russians of involvement in the hack, CNN seems to have no such qualms:
The FBI, Secret Service and U.S. intelligence agencies are all involved in investigating the breach, which they consider among the most sophisticated attacks ever launched against U.S. government systems. The intrusion was routed through computers around the world, as hackers often do to hide their tracks, but investigators found tell-tale codes and other markers that they believe point to hackers working for the Russian government. A spokesman for the National Security Council declined to comment. Neither the U.S. State Department or the Russian immediately embassy responded to a request for comment.
In all likelihood, the White House hack is being connected to a cybercrime operation known as “Pawn Storm” that saw government, media and military agencies in the United States, Pakistan, and Europe targeted with spearphishing, watering hole attacks and malware-laced Word documents.
Earlier this year, Operation Pawn Storm was even revealed to be targeting users of non-jailbroken iPhones and iPads.
But my guess is that the most likely avenue for the hackers would have been a plain-and-simple phishing operation, tricking users into handing their passwords over to the hackers, or visiting a webpage which contains a drive-by malware attack designed to pilfer login credentials.
Yes, it’s basic social engineering – but it works an astonishing amount of the time.
Aside from Western agencies, Operation Pawn Storm also targeted politicians and dissidents who oppose the Russian government.
You don’t, therefore, need to be a rocket scientist to work out who might be high on the list of suspects.
In what was clearly a step linked to the current crop of hacks, the State Department last month temporarily disconnected its main unclassified network from the internet for what it described as a “planned outage” to make improvements to its security.
The news of the White House hack has come within days of President Obama ordering new sanctions against overseas hackers.
Of course, even if fingers of suspicion are pointing towards Russia, that’s very different from having convincing proof that Moscow is behind the hack.
Attribution of internet attacks is notoriously difficult and much harder than the average man in the street (and possibly politician) imagines, which is certainly a frustration for news reporters who wish to tie up a story with a simple bow for the benefit of the audiences at home.
Many were rightly skeptical that the hack of Sony Pictures could be so easily placed at North Korea’s door, and similarly we shouldn’t jump too easily behind headlines claiming that the Russian government is behind this latest hack of the White House either.
Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.