U.S. markets open in 3 hours 23 minutes
  • S&P Futures

    3,814.75
    -24.25 (-0.63%)
     
  • Dow Futures

    31,418.00
    -47.00 (-0.15%)
     
  • Nasdaq Futures

    12,459.75
    -204.00 (-1.61%)
     
  • Russell 2000 Futures

    2,171.00
    -18.70 (-0.85%)
     
  • Crude Oil

    66.10
    +0.01 (+0.02%)
     
  • Gold

    1,689.20
    -9.30 (-0.55%)
     
  • Silver

    25.34
    +0.06 (+0.23%)
     
  • EUR/USD

    1.1878
    -0.0047 (-0.39%)
     
  • 10-Yr Bond

    1.5540
    0.0000 (0.00%)
     
  • Vix

    27.47
    -1.10 (-3.85%)
     
  • GBP/USD

    1.3832
    +0.0004 (+0.03%)
     
  • USD/JPY

    108.5200
    +0.1380 (+0.13%)
     
  • BTC-USD

    50,204.82
    -646.93 (-1.27%)
     
  • CMC Crypto 200

    1,015.95
    +72.78 (+7.72%)
     
  • FTSE 100

    6,631.82
    +1.30 (+0.02%)
     
  • Nikkei 225

    28,743.25
    -121.07 (-0.42%)
     

Russia-Linked Hack Spread Via New Malware, Security Experts Say

  • Oops!
    Something went wrong.
    Please try again later.
  • Oops!
    Something went wrong.
    Please try again later.
Alyza Sebenius
·1 min read
  • Oops!
    Something went wrong.
    Please try again later.
  • Oops!
    Something went wrong.
    Please try again later.

(Bloomberg) -- Suspected Russian hackers used a previously unknown piece of malware called “Raindrop” in the SolarWinds cyberattack, potentially infecting more computer systems than had been thought, according to digital security firm Symantec.

It’s the latest information to emerge about the sprawling hack that sent shock waves through the U.S. government and business world last month.

Raindrop “was used against a select number of victims that were of interest to the attackers,” according to a blog post by a team headed by Eric Chien, the technical director at Symantec, which is a unit of Broadcom Inc.

QuickTake: The Facts and Mysteries About Russia’s Hack of U.S.

Symantec has not found evidence that it was delivered through the SolarWinds malware, which means computer systems showing no signs of containing SolarWinds software or the malware it delivered could still be victims of the attack, according to Chien. He said the hackers likely used credentials stolen during the SolarWinds phase of the attack to log in and deliver Raindrop to other systems.

“Machines that don’t have SolarWinds could still be infected,” suggesting the hack could be larger than previously understood, said Chien. “Hopefully Raindrop is the end of the chain, but there’s no guarantee.”

For more articles like this, please visit us at bloomberg.com

Subscribe now to stay ahead with the most trusted business news source.

©2021 Bloomberg L.P.