2020 United States federal government data breach (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "2020 United States federal government data breach" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
49th place
47th place
7th place
7th place
99th place
77th place
12th place
11th place
3,700th place
2,360th place
388th place
265th place
low place
low place
786th place
558th place
79th place
65th place
20th place
30th place
36th place
33rd place
6,171st place
4,055th place
28th place
26th place
34th place
27th place
low place
low place
140th place
115th place
476th place
282nd place
low place
low place
193rd place
152nd place
220th place
155th place
low place
low place
129th place
89th place
low place
low place
137th place
101st place
114th place
90th place
269th place
201st place
312th place
197th place
206th place
124th place
259th place
188th place
low place
low place
431st place
274th place
7,969th place
6,917th place
204th place
353rd place
61st place
54th place
low place
low place
474th place
329th place
low place
low place
599th place
369th place
30th place
24th place
low place
low place
2,523rd place
1,574th place
8th place
10th place
5th place
5th place
1,030th place
584th place
561st place
392nd place
47th place
38th place
low place
low place
1,303rd place
808th place
8,888th place
6,276th place
117th place
145th place
low place
low place
8,991st place
6,535th place
low place
low place
1,716th place
973rd place
low place
low place
low place
low place
571st place
403rd place
low place
low place
389th place
273rd place
low place
low place
22nd place
19th place
881st place
611th place
low place
6,094th place
4,767th place
3,136th place
1,943rd place
1,253rd place
low place
low place
low place
low place
4,244th place
2,773rd place
low place
low place
5,670th place
3,086th place
54th place
48th place
low place
low place
7,835th place
5,254th place
4,756th place
2,900th place
7,049th place
4,298th place
low place
low place
2,429th place
1,561st place
1,521st place
944th place
383rd place
320th place
108th place
80th place
low place
6,485th place
3,281st place
1,880th place
752nd place
484th place
92nd place
72nd place
low place
8,201st place
low place
low place
115th place
82nd place
low place
low place
low place
low place
low place
low place

abc11.com

apnews.com

arstechnica.com

axios.com

bankinfosecurity.com

bbc.co.uk

bbc.com

bgr.com

  • Smith, Chris (January 1, 2021). "Here's why it's so dangerous that SolarWinds hackers accessed Microsoft's source code". BGR. Archived from the original on February 26, 2021. Retrieved January 13, 2021. More than two weeks after the hacks, Microsoft disclosed that the attackers were able to access a critical piece of software, the source code from one or more undisclosed products. Microsoft explained in a blog post that the hackers were not able to modify the source code. But even just a glance at a source code from a company like Microsoft might be enough for hackers to develop new attacks that compromise other Microsoft products. ... Microsoft's blog post is meant to reassure governments and customers, but the fact remains that hackers might be in possession of the kind of secrets they shouldn't have access to. Time will tell if gaining access to Microsoft's source code will allow the same team of attackers to create even more sophisticated hacks.

bleepingcomputer.com

bloomberg.com

bloomberglaw.com

news.bloomberglaw.com

businessinsider.com

c4isrnet.com

cbc.ca

cbsnews.com

chron.com

cisa.gov

cisa.gov

us-cert.cisa.gov

cloudflare.com

blog.cloudflare.com

cnbc.com

cnn.com

cnn.com

edition.cnn.com

computerworld.com

  • Bradley, Susan (January 4, 2021). "SolarWinds, Solorigate, and what it means for Windows updates". Computerworld. Archived from the original on March 22, 2021. Retrieved January 13, 2021. Microsoft investigated further and found that while the attackers were not able to inject themselves into Microsoft's ADFS/SAML infrastructure, 'one account had been used to view source code in a number of source code repositories. The account did not have permissions to modify any code or engineering systems and our investigation further confirmed no changes were made.' This is not the first time Microsoft's source code has been attacked or leaked to the web. In 2004, 30,000 files from Windows NT to Windows 2000 leaked onto the web via a third party. Windows XP reportedly leaked online last year.

cpomagazine.com

  • Hope, Alicia (January 7, 2021). "Software Giant Admits That SolarWinds Hackers Viewed Microsoft Source Code". CPO Magazine. Archived from the original on January 26, 2021. Retrieved January 13, 2021. Microsoft disclosed [that] the hacking group behind the SolarWinds attack also viewed Microsoft source code for unnamed products. ... Microsoft, however, downplayed the breach, saying that the security of its products does not depend on the secrecy of its source code. Contrarily, Microsoft source code for most high-profile products remains to be among the most jealously guarded corporate secrets, shared only with a few trusted customers and governments.

cyber.gc.ca

cyberscoop.com

deepinstinct.com

defensesystems.com

dhs.gov

cyber.dhs.gov

domaintools.com

dw.com

fbi.gov

fireeye.com

forbes.com

fox10phoenix.com

github.com

gizmodo.com

ico.org.uk

independent.co.uk

itwire.com

japantimes.co.jp

justsecurity.org

krebsonsecurity.com

latimes.com

malwarebytes.com

blog.malwarebytes.com

mandiant.com

marketwatch.com

mashable.com

miamiherald.com

msn.com

nbcnews.com

newsweek.com

npr.org

nytimes.com

  • Sanger, David E.; Perlroth, Nicole; Schmitt, Eric (December 15, 2020). "Scope of Russian Hack Becomes Clear: Multiple U.S. Agencies Were Hit". The New York Times. Archived from the original on December 18, 2020. Retrieved December 15, 2020.
  • Sanger, David E.; Perlroth, Nicole; Barnes, Julian E. (December 16, 2020). "Billions Spent on U.S. Defenses Failed to Detect Giant Russian Hack". The New York Times. Archived from the original on December 16, 2020. Retrieved December 16, 2020.
  • Perlroth, Nicole (December 25, 2020). "Russians Are Believed to Have Used Microsoft Resellers in Cyberattacks". The New York Times. Archived from the original on May 31, 2021. Retrieved December 25, 2020.
  • Bossert, Thomas P. (December 17, 2020). "Opinion | I Was the Homeland Security Adviser to Trump. We're Being Hacked". The New York Times. Archived from the original on December 17, 2020. Retrieved December 17, 2020.
  • Sanger, David E. (December 13, 2020). "Russian Hackers Broke Into Federal Agencies, U.S. Officials Suspect". The New York Times. Archived from the original on December 14, 2020. Retrieved December 14, 2020.
  • Sanger, David E.; Perlroth, Nicole (December 17, 2020). "More Hacking Attacks Found as Officials Warn of 'Grave Risk' to U.S. Government". The New York Times. Archived from the original on December 17, 2020. Retrieved December 17, 2020.
  • Sanger, David E.; Perlroth, Nicole (December 8, 2020). "FireEye, a Top Cybersecurity Firm, Says It Was Hacked by a Nation-State". The New York Times. Archived from the original on December 15, 2020. Retrieved December 15, 2020.
  • Sanger, David E.; Rappeport, Alan (December 22, 2020). "Treasury Department's Senior Leaders Were Targeted by Hacking". New York Times. Archived from the original on March 28, 2021. Retrieved December 23, 2020.
  • Rashbaum, William K.; Protess, Ben; Vogel, Kenneth P.; Hong, Nicole (May 27, 2021). "Prosecutors Investigating Whether Ukrainians Meddled in 2020 Election". The New York Times. Archived from the original on June 12, 2021. Retrieved July 31, 2021.
  • Sanger, David E.; Perlroth, Nicole; Barnes, Julian E. (January 2, 2021). "As Understanding of Russian Hacking Grows, So Does Alarm". The New York Times. Archived from the original on June 6, 2021. Retrieved March 24, 2023.
  • Perlroth, Nicole (December 31, 2020). "Microsoft Says Russian Hackers Viewed Some of Its Source Code". The New York Times. Archived from the original on June 7, 2021. Retrieved January 13, 2021.
  • Perlroth, Nicole; Sanger, David E.; Barnes, Julian E. (January 6, 2021). "Widely Used Software Company May Be Entry Point for Huge U.S. Hacking". The New York Times. Archived from the original on May 31, 2021. Retrieved January 12, 2021.
  • Sanger, David E. (January 13, 2021). "Biden to Restore Homeland Security and Cybersecurity Aides to Senior White House Posts". The New York Times. Archived from the original on March 29, 2021. Retrieved January 13, 2021. President-elect Joseph R. Biden Jr., facing the rise of domestic terrorism and a crippling cyberattack from Russia, is elevating two White House posts that all but disappeared in the Trump administration: a homeland security adviser to manage matters as varied as extremism, pandemics and natural disasters, and the first deputy national security adviser for cyber and emerging technology. ... Mr. Trump dismantled the National Security Council's pandemic preparedness office, and while he had an active cyberteam at the beginning of his term, it languished. 'It's disturbing to be in a transition moment when there really aren't counterparts for that transition to be handed off,' Ms. Sherwood-Randall said. ... The SolarWinds hacking, named after the maker of network management software that Russian intelligence agents are suspected of having breached to gain access to the email systems of government agencies and private companies, was a huge intelligence failure.
  • Sanger, David E.; Barnes, Julian E.; Perlroth, Nicole (March 7, 2021). "Preparing for Retaliation Against Russia, U.S. Confronts Hacking by China". The New York Times. Archived from the original on March 11, 2021. Retrieved March 15, 2021.
  • Kolbe, Paul R. (December 24, 2020). "With Hacking, the United States Needs to Stop Playing the Victim". The New York Times. ProQuest 2473435248. Archived from the original on May 19, 2021. Retrieved December 24, 2020.

politico.com

pri.org

propublica.org

proquest.com

reuters.com

reuters.com

uk.reuters.com

reviewjournal.com

rollingstone.com

schneier.com

scmagazine.com

securityboulevard.com

securityweek.com

silicon.co.uk

sky.com

news.sky.com

slashgear.com

slate.com

talkingpointsmemo.com

technologyreview.com

techradar.com

  • Spadafora, Anthony (January 12, 2021). "Mimecast may also have been a victim of the SolarWinds hack campaign". TechRadar. Archived from the original on January 13, 2021. Retrieved January 13, 2021. The reason that Mimecast may have been attacked by the same threat actor behind the SolarWinds hack is due to the fact that these hackers often add authentication tokens and credentials to Microsoft Active Directory domain accounts in order to maintain persistence on a network and to achieve privilege escalation.

techtimes.com

telegraph.co.uk

thedispatch.com

theguardian.com

thehill.com

theintercept.com

theregister.com

theverge.com

threatpost.com

time.com

timesofisrael.com

trendmicro.com

trustedsec.com

volexity.com

washingtonpost.com

wbrz.com

web.archive.org

wired.com

worldcat.org

search.worldcat.org

wsj.com

zdnet.com