Lessons Learned From SolarWinds: Defensive Strategy Against Novel Malwareby@rajeshkhazanchi
229 reads

Lessons Learned From SolarWinds: Defensive Strategy Against Novel Malware

by Rajesh Khazanchi4mFebruary 17th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

SolarWinds, a leading provider of IT monitoring and management solutions for enterprises, disclosed that it had fallen prey to a widespread supply chain attack trojanizing its Orion business software updates. The attackers deployed a novel malicious tool, SUNSPOT, into the build environment of Orion’s platform to inject a backdoor known as SUNBURST. As many as 17,000 customers may have installed the trojanized software updates. The initial list of victims not only included the U.S. government but other consulting and technology firms in North America, Europe, Asia, and the Middle East.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Lessons Learned From SolarWinds: Defensive Strategy Against Novel Malware
Rajesh Khazanchi HackerNoon profile picture
Rajesh Khazanchi

Rajesh Khazanchi

@rajeshkhazanchi

Co-founder and EVP of ColorTokens

Learn More
LEARN MORE ABOUT @RAJESHKHAZANCHI'S
EXPERTISE AND PLACE ON THE INTERNET.

Share Your Thoughts

About Author

Rajesh Khazanchi HackerNoon profile picture
Rajesh Khazanchi@rajeshkhazanchi
Co-founder and EVP of ColorTokens

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
L O A D I N G
. . . comments & more!