The United States intelligence services indicate that the great hacking discovered on Dec. 13 “likely” had its origin in Russia, although they are still continuing with the investigation. 

A joint statement issued by four security agencies on Jan. 5 reported the results, in which they estimate that at least 18,000 public and private sector customers were tricked into updating their computer systems. 

The report states, “An Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and nongovernmental networks.” 

The four agencies that make up the Unified Cyber Coordination Group (UCG) are the FBI, the Cybersecurity and Infrastructure Agency (CISA), the Office of the Director of National Intelligence (ODNI) and the National Security Agency (NSA).

The White House National Security Council created the UCG to investigate and address the consequences of the attack on SolarWinds’s Orion product.

The attack was conducted on the SolarWinds Orion supply chain by adding malicious code (called Sunburst/Solorigate) to the update packages.

Although about 18,000 Orion customers were affected, less than 10 installed a second stage of malicious code, called Teardrop.

After many independent researchers looked at the SolarWinds’s links that they considered suspicious, possible tampering with Dominion Voting Systems voting machines was pointed out on charges of massive election fraud in the United States.

Even these insecure preliminary “probabilities” issued by the security agencies generate suspicion, given that the President, Donald Trump, mentioned the possible involvement of the Chinese Communist Party (CCP) in the hacking.

“The Cyber Hack is far greater in the Fake News Media. than in actuality. I have been fully briefed and everything is well under control. Russia, Russia, Russia is the priority chant when anything happens because Lamestream is, for mostly financial reasons, petrified of …” he wrote on Dec. 19.

He continued, “discussing the possibility that it may be China (it may!). There could also could have been a hit on our ridiculous voting machines during the election, which is now obvious that I won big, making it an even more corrupted embarrassment for the USA.”

It seems that the hackers had also been stealing data from the National Telecommunications and Information Administration (NTIA) of the Department of Commerce, for months, hacking into the authentication process of Microsoft Office 365, reported Forbes.

“The compromise of SolarWinds Orion network management products poses unacceptable risks to the security of federal networks,” said CISA acting Director Brandon Wales.

SolarWinds is applied in the systems of 300,000 organizations worldwide and many U.S. federal agencies, including the military, Pentagon, State Department, NASA, National Security Agency, Department of Justice, and the White House.

The FBI, U.S. Marshals Service, and the Texas Rangers raided the SolarWinds headquarters in Austin, Texas, on Dec. 14, and the agency that was suppose to be watching over the system was”asleep,” it didn’t detect the hack.

Dominion Voting Systems, which provides voting machines in 28 states, uses SolarWinds software, according to Dominion’s website.

A guest on the Fox News Hannity show referred to SolarWinds on Dec. 14, according to The Gateway Pundit, “The agency that is supposed to oversee this type of intrusion, this type of Trojan Malware virus that affects the nation or even the world in this case and to find them. Well he didn’t detect it. His agency was asleep. They didn’t discover—it was out in the wilds since March.”

SolarWinds was also connected to Barack Obama, the Clintons, and the CCP.

According to Trump campaign lawyers’ claims of election fraud, Dominion’s vote-counting machines were being used by the CCP, Russia, and Iran to interfere with the election process.