![]() ![]() While the event was unprecedented, it also achieved immense success, which virtually guarantees adversaries will continue using many of its methods and tactics in future campaigns. businesses and government institutions rely on-an approach security experts have long feared but one that has never been used on U.S. ![]() The Wall Street Journal described the hack as leveraging “extraordinarily stealthy tradecraft, using cyber tools never before seen in a previous attack, with a strategy that zeroed in on a weak link in the software supply chain that all U.S. Given the extreme levels of discipline, covertness and damage-potential involved with the attack, it impressed even the most experienced incident responders. As always, make sure to review and follow the recommendations and countermeasures from both SolarWinds and FireEye. ![]() ” A few days later, this attack was linked to a widespread and complex supply chain attack, referred to as “Sunburst,” targeting SolarWinds’ enterprise IT monitoring solution. Cybersecurity vendor FireEye recently disclosed a sophisticated attack which led to the “ unauthorized access of their red team tools.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |