Malware Devil

Tuesday, January 5, 2021

Contextualizing Microsoft’s Source Code Exposure in the SolarWinds Attacks

In the middle of December, IT management software provider SolarWinds revealed in a security advisory that it had fallen victim to a sophisticated supply chain attack. The offensive involved the placement of a backdoor known as SUNBURST into versions 2019.4 HF 5, 2020.2 with no hotfix installed and 2020.2 HF 1 of the company’s Orion Platform software. If executed, SUNBURST allowed an attacker to compromise the server running the Orion build.

The post Contextualizing Microsoft’s Source Code Exposure in the SolarWinds Attacks appeared first on Security Boulevard.

Read More

The post Contextualizing Microsoft’s Source Code Exposure in the SolarWinds Attacks appeared first on Malware Devil.



https://malwaredevil.com/2021/01/05/contextualizing-microsofts-source-code-exposure-in-the-solarwinds-attacks-2/?utm_source=rss&utm_medium=rss&utm_campaign=contextualizing-microsofts-source-code-exposure-in-the-solarwinds-attacks-2

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...