Current:Home > ContactUS regulators sue SolarWinds and its security chief for alleged cyber neglect ahead of Russian hack -Financial Clarity Guides
US regulators sue SolarWinds and its security chief for alleged cyber neglect ahead of Russian hack
View
Date:2025-04-22 10:24:04
U.S. regulators on Monday sued SolarWinds, a Texas-based technology company whose software was breached in a massive 2020 Russian cyberespionage campaign, for fraud for failing to disclose security deficiencies ahead of the stunning hack.
The company’s top security executive was also named in the complaint filed by the Securities and Exchange Commission seeking unspecified civil penalties, reimbursement of “ill-gotten gains” and the executive’s removal.
Detected in December 2020, the SolarWinds hack penetrated U.S. government agencies including the Justice and Homeland Security departments, and more than 100 private companies and think tanks. It was a rude wake-up call on the perils of neglecting cybersecurity.
In the 68-page complaint filed in New York federal court, the SEC says SolarWinds and its then vice president of security, Tim Brown, defrauded investors and customers “through misstatements, omissions and schemes” that concealed both the company’s “poor cybersecurity practices and its heightened — and increasing — cybersecurity risks.”
In a statement, SolarWinds called the SEC charges unfounded and said it is “deeply concerned this action will put our national security at risk.”
Brown performed his responsibilities “with diligence, integrity, and distinction,” his lawyer, Alec Koch, said in a statement. Koch added that “we look forward to defending his reputation and correcting the inaccuracies in the SEC’s complaint.” Brown’s current title at SolarWinds is chief information security officer.
The SEC’s enforcement division director, Gurbir S. Grewal, said in a statement that SolarWinds and Brown ignored “repeated red flags” for years, painting “a false picture of the company’s cyber controls environment, thereby depriving investors of accurate material information.”
The very month that SolarWinds registered for an initial public offering, October 2018, Brown wrote in an internal presentation that the company’s “current state of security leaves us in a very vulnerable state,” the complaint says.
Among the SEC’s damning allegations: An internal SolarWinds presentation shared that year said the company’s network was “not very secure,” meaning it was vulnerable to hacking that could lead to “major reputation and financial loss. Throughout 2019 and 2020, the SEC alleged, multiple communications among SolarWinds employees, including Brown, “questioned the company’s ability to protect its critical assets from cyberattacks.”
SolarWinds, which is based in Austin, Texas, provides network-monitoring and other technical services to hundreds of thousands of organizations around the world, including most Fortune 500 companies and government agencies in North America, Europe, Asia and the Middle East.
The nearly two-year espionage campaign involved the infection of thousands of customers by seeding malware in the update channel of the company’s network management software. Capitalizing on the supply-chain hack, the Russian cyber operators then stealthily penetrated select targets including about a dozen U.S. government agencies and prominent software and telecommunications providers.
In its statement, SolarWinds called the SEC action an “example of the agency’s overreach (that) should alarm all public companies and committed cybersecurity professionals across the country.”
It did not explain how the SEC’s action could put national security at risk, though some in the cybersecurity community have argued that holding corporate information security officers personally responsible for identified vulnerabilities could make them less diligent about uncovering them — and discourage qualified people from aspiring to such positions.
Under the Biden administration, the SEC has been aggressive about holding publicly traded companies to account for cybersecurity lapses and failures to disclose vulnerabilities. In July, it adopted rules requiring them to disclose within four days all cybersecurity breaches that could affect their bottom lines. Delays would be permitted if immediate disclosure poses serious national-security or public-safety risks.
Victims of the SolarWinds hack whose Microsoft email accounts were violated included the New York federal prosecutors’ office, then-acting Homeland Security Secretary Chad Wolf and members of the department’s cybersecurity staff, whose jobs included hunting threats from foreign countries.
veryGood! (3)
Related
- Military service academies see drop in reported sexual assaults after alarming surge
- No place is safe in Gaza after Israel targets areas where civilians seek refuge, Palestinians say
- What we know about the deadly blast at a Gaza City hospital
- How international law applies to war, and why Hamas and Israel are both alleged to have broken it
- Can Bill Belichick turn North Carolina into a winner? At 72, he's chasing one last high
- Trevor May rips Oakland A's owner John Fisher in retirement stream: 'Sell the team dude'
- Taco Bell is the quickest fast-food drive-thru experience, study finds. Here's where the others rank.
- The madness in women's college basketball will continue. And that's a great thing.
- Who are the most valuable sports franchises? Forbes releases new list of top 50 teams
- UN to vote on Gaza resolution that would condemn attack by Hamas and all violence against civilians
Ranking
- Grammy nominee Teddy Swims on love, growth and embracing change
- Neymar in tears while being carted off after suffering apparent knee injury
- What does 'tfw' mean? What to know if you're unsure how to use the term when texting
- New Orleans district attorney and his mother were carjacked, his office says
- NHL in ASL returns, delivering American Sign Language analysis for Deaf community at Winter Classic
- Fijian prime minister ‘more comfortable dealing with traditional friends’ like Australia than China
- A security problem has taken down computer systems for almost all Kansas courts
- Major U.S. science group lays out a path to smooth the energy transtion
Recommendation
Nevada attorney general revives 2020 fake electors case
Musk’s X tests $1 fee for new users in the Philippines and New Zealand in bid to target spam
Natalie Sanandaji of Long Island describes escaping Israeli dance festival during Hamas attack: We heard the first gunshots
Former Wisconsin Senate clerk resigned amid sexual misconduct investigation, report shows
Whoopi Goldberg is delightfully vile as Miss Hannigan in ‘Annie’ stage return
Fijian prime minister ‘more comfortable dealing with traditional friends’ like Australia than China
College football bowl projections: What Washington's win means as season hits halfway mark
Las Vegas prosecutor faces charges after police say he tried to lure an underage girl for sex