vimarsana.com


To revist this article, visit My Profile, then View saved stories.
One of the most chilling aspects of Russia's recent hacking spree—which breached numerous United States government agencies among other targets—was the successful use of a “supply chain attack” to gain tens of thousands of potential targets from a single compromise at the IT services firm SolarWinds. But this wasn't the only striking feature of the assault. After that initial foothold, the attackers bored deeper into their victims' networks with simple and elegant strategies. Now researchers are bracing for a surge in those techniques from other attackers.
The SolarWinds hackers used their access in many cases to infiltrate their victims' Microsoft 365 email services and Microsoft Azure Cloud infrastructure—both treasure troves of potentially sensitive and valuable data. The challenge of preventing these types of intrusions into Microsoft 365 and Azure is that they don't depend on specific vulnerabilities that can simply be patched. Instead hackers use an initial attack that positions them to manipulate Microsoft 365 and Azure in a way that appears legitimate. In this case, to great effect.

Related Keywords

United States ,Russia ,Russian ,Matthew Mcwhirt ,Mandiant Fireeye ,Shaked Reiner ,Directory Federation Services ,National Security Agency ,Microsoft ,Microsoft Azure Cloud ,Active Directory Federation ,Security ,Cyberattacks And Hacks ,Cyber Security ,Malware ,Vulnerabilities ,Hacking ,Web ,ஒன்றுபட்டது மாநிலங்களில் ,ரஷ்யா ,ரஷ்ய ,குலுங்கியது ரைநர் ,அடைவு கூட்டமைப்பு சேவைகள் ,மைக்ரோசாஃப்ட் ,மைக்ரோசாஃப்ட் நீலமான மேகம் ,செயலில் அடைவு கூட்டமைப்பு ,பாதுகாப்பு ,சைபர் பாதுகாப்பு ,தீம்பொருள் ,ஹேக்கிங் ,வலை ,

© 2025 Vimarsana

vimarsana.com © 2020. All Rights Reserved.