The United States Federal Bureau of Investigation (FBI) is investigating whether hackers, who attacked networks of US authorities and companies, also infiltrated the software of the Russian company JetBrains, based in the Czech Republic. Russian hackers might have used JetBrains software as a way to infiltrate the networks of US technology companies and the government.
In a statement published on a company’s blog, CEO Maxim Šafirov declined the assumption, saying that “the Prague company JetBrains is not involved in hacking intrusions into the networks of American authorities and companies”. In the case of an investigation, the company is ready to fully cooperate, he added.
JetBrains is known as a company providing development tools facilitating and streamlining the work of professional developers, which, after two decades of existence, has offices in five countries around the world, including the US and Russia.
The startup has developed a programming language that has become Google’s main development tool for the Android operating system. Therefore, the offers have been pouring in and its services are said to be used by the developers of 300,000 companies.
One of them is SolarWinds of Austin, Texas, which is the network management software of which has played a central role in hacking US government and private enterprise networks. Investigators are focusing on a JetBrains product called TeamCity, which allows developers to test and exchange software code before it is released.
On Tuesday, the FBI, NSA, and CIA, all which also allegedly suffered attacks on their networks, said that Russia was probably behind the large-scale December attack on government institutions. Moscow denies the allegations.
According to the agencies, the goal of the attack was to gather sensitive information. So far, only the Ministries of Trade, Energy, and Finance have publically confirmed that they have been the target of an attack.
Hackers also allegedly entered the system of national laboratories, the National Bureau of Nuclear Safety (NNSA), and the US State Department and Homeland Security. In addition, they also gained access to the networks of many private companies, including Microsoft.
Title image: Norwich senior Jason Glanowsky watches a computer attack on his fellow students at the Norwich University computer security training program in Northfield, Vt. on Thursday, Jan. 10, 2002. The students are learning to look for signs of an attack in scrolling numbers on a computer screen or how to tell when an adversary is probing a computer network looking for a way in. (AP Photo/Toby Talbot)