
In the middle of December, IT management software provider SolarWinds revealed in a security advisory that it had fallen victim to a sophisticated supply chain attack. The offensive involved the placement of a backdoor known as SUNBURST into versions 2019.4 HF 5, 2020.2 with no hotfix installed and 2020.2 HF 1 of the company’s Orion Platform software. If executed, SUNBURST allowed an attacker to compromise the server running the Orion build.
The post Contextualizing Microsoft’s Source Code Exposure in the SolarWinds Attacks appeared first on Security Boulevard.
The post Contextualizing Microsoft’s Source Code Exposure in the SolarWinds Attacks appeared first on Malware Devil.
https://malwaredevil.com/2021/01/05/contextualizing-microsofts-source-code-exposure-in-the-solarwinds-attacks-2/?utm_source=rss&utm_medium=rss&utm_campaign=contextualizing-microsofts-source-code-exposure-in-the-solarwinds-attacks-2
No comments:
Post a Comment