TechNewsPro_Masthead_2.jpg

The latest in NEWS, RESOURCES and JOBS

Lower the TCO of your legacy data wareho
Talend_Banner_728x90px_v1.jpg
  • Marijan Hassan - Tech Journalist

SolarWinds Hack: Everything We Know So Far

On December 13, 2020, reports emerged of a SolarWinds hack that affected various US government agencies like the Treasury department and private organisations like Microsoft and Intel.



SolarWinds is one of the biggest vendors for IT monitoring and management solutions and the high profile nature of its client makes this attack one of the biggest cases of cyber-espionage suffered by the US.


And now, with the attack being officially blamed on the Russian government, there is the risk of putting more tension on an already strained relationship between the US and Russia.

Here is a rundown on everything we know about the SolarWinds hack.


How the attack worked


The hackers targeted a SolarWinds server that is used to push updates to their Orion platform products.


They then injected their malware dubbed SUPERBURST into the SolarWinds update package allowing them to infect any system that applied the update.


SUPERBURST malware opens a backdoor on the infected system giving the hackers unlimited access to the system. They can steal and modify data as they please.


It was the Cybersecurity company, FireEye that discovered the SolarWinds breach as they were investigating their breach. The company determined that the hackers got into their system by leveraging a vulnerability on a SolarWinds product they were using.

Since then, more than 18,000 private and government organisations have found to be infected by the SUNBURST malware.


How the hackers got into SolarWinds


The hackers used the oldest trick in the book. Password guessing and spraying. This is according to CISA, which notes that anyone could easily guess the password that SolarWinds had used on their update server. The password was “solarwinds123”.


There was also a case of poorly secured administrative credentials that could easily be accessed through remote access services.


Organizations affected by the SolarWinds hack


Government agencies affected include:

  • Departments of the Homeland Security

  • Treasury (emails for top officials were read and stolen)

  • The Commerce department

  • The Pentagon

  • Two national labs

  • The Federal Energy Regulatory Commission

  • National Nuclear Safety Agency

Private firms affected by the SolarWinds include:

  • Microsoft

  • Cisco

  • Intel

Did the Russian Government hack SolarWinds


The FBI, NSA, CISA, and ODNI released a joint statement in which they named Russia as the likely origin of the attack. News reports suggest that the attack was conducted by Cozybear hacking group backed by the Russian Intelligence Agency SVR.


Element_300x600_June_2.jpg

LATEST RESOURCES

 

 

Parting the clouds. 

for greater security

Covid-19 has landed CSOs a unique opportunity to embrace web isolation.

Eliminate malware threats with zero trust 

Isolation-powered security provides full protection against email and Web based threats.

7 Customer Service Mistakes Companies Should Avoid Making

2020 was a tumultuous year but it did bring customer service back to the forefront of the business planning agenda for 2021. As you plan and prioritise your initiatives, it is important to avoid mistakes.

Integrating Compliance into Innovation: Taking Control Over Customer Communications

Compliance is one of those areas that is better off unnoticed. When compliance does get attention, it is usually because something has gone wrong and that is something that keeps executives up at night. It is easy to see why. 

Artificial Intelligence Based COVID Signature

Detection Software

The software takes the X-Rays and CT scans in digital format and analyses the X-Ray reports through uploading the images which is followed by detailed report about the patient suffering from COVID19 or similar ailments.

Six Steps to Drive Your

Process Center of Excellence to Success

Find out why yo need a center of excellence - and how save you time and money while improving experiences for both your customers and employees. 

Steps to Deliver Data You Can trust at the Speed of Business

Why trusted data is the key to digital transformation. Discover and cleanse your data. 

Organise data you can trust and empower people

Automate your data pipelines and enable data access.

2021 Threat Report 

Four Key Trends in the Cyber-Threat Landscape.

The security implications of remote working, SaaS takeover, rise of fearware, server side attacks, ransomware and Darktrace immune system.

Safe, inclusive communications for the University of Innsbruck

The open matrix is the foundation for secure, collaborative academic research and learning. Keen to support its learning culture, the university wanted to introduce a real time messaging system. 

Darktrace_Logo_Main.png
Element_Logo.jpg
eGain_logo.jpg
talend_Logo.png
MenloSecurity_Signature_Purple_RGB.jpg
MenloSecurity_Signature_Purple_RGB.jpg
nintex_logo.png
GMC_Software_Logo.jpg

    SUBSCRIBE

to our latest RESOURCES

to keep up to date with the

latest whitepapers

WP_GMC_Cover.jpg
WP_bold360_Cover.jpg