Malware Devil

Friday, December 18, 2020

How X.509 Certificates Were Involved in SolarWinds Attack | Keyfactor

For a moment, we were ready to put 2020 behind us, until this week.

It started with reported theft of FireEye’s Red Team tools, and then came the bigger news. FireEye and the U.S. Treasury and Commerce departments had been infiltrated via SolarWinds Orion software updates, which included malicious code injected by Russian-backed hacking group Cozy Bear (APT 29).

This news doesn’t just affect SolarWinds, FireEye, and U.S. government agencies – it affects us all. When a nation-state attacks one of us, they attack us all, and we all feel the sting. It’s a sobering reminder of our everyday reality: anyone can be breached.

The post How X.509 Certificates Were Involved in SolarWinds Attack | Keyfactor appeared first on Security Boulevard.

Read More

The post How X.509 Certificates Were Involved in SolarWinds Attack | Keyfactor appeared first on Malware Devil.



https://malwaredevil.com/2020/12/18/how-x-509-certificates-were-involved-in-solarwinds-attack-keyfactor/?utm_source=rss&utm_medium=rss&utm_campaign=how-x-509-certificates-were-involved-in-solarwinds-attack-keyfactor

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...