vimarsana.com

Page 6 - பிரிட்டன் தேசிய சைபர் பாதுகாப்பு மையம் News Today : Breaking News, Live Updates & Top Stories | Vimarsana

US courts system fears SolarWinds snafu could have let state hackers poke about in sealed case documents

Problems for charging spies in future? Probably not, says ex-NCSC chief Gareth Corfield Fri 8 Jan 2021 // 19:30 UTC Share Copy The SolarWinds hack exposed sealed US court documents – which could have a serious effect on Western sanctions against state-backed hackers. As well as the well-publicised effects on FireEye and Microsoft, the downstream impact of the SolarWinds supply chain attack also struck the American federal court system. Aside from the obvious embarrassment and embuggerance that caused, it also may have revealed several formerly sealed, or secret, criminal case documents. Those documents could have revealed information about upcoming criminal charges against Russian hackers, potentially exposing titbits that could feed into a wider intelligence picture of how those people are identified.

SolarWinds Supply Chain Hit: Victims Include Cisco, Intel

Get Permission The FBI, CISA and the ODNI are leading the U.S. government s response to the apparent cyberespionage operation that backdoored the widely used SolarWinds Orion network monitoring software. American technology giants Cisco and Intel are among the thousands of organizations that have been affected by the supply chain attack targeting software vendor SolarWinds and, by extension, its customers. The attack campaign, which was first revealed Sunday by FireEye, one of its victims, centers on the Orion network monitoring software from SolarWinds, a technology firm based in Austin, Texas, that until recently had a valuation of about $1 billion. While SolarWinds may be relatively unknown, the company has 300,000 customers, of which nearly 18,000 may have been caught up in the supply chain attack, which involved attackers adding a backdoor to the company s Orion software, apparently by having infiltrated its software development pipeline (see:

SolarWinds Supply-Chain Hit: Victims Include Cisco, Intel

Get Permission The FBI, CISA and the ODNI are leading the U.S. government s response to the apparent cyberespionage operation that backdoored the widely used SolarWinds Orion network monitoring software. American technology giants Cisco and Intel are among the thousands of organizations that have been affected by the supply chain attack targeting software vendor SolarWinds and, by extension, its customers. The attack campaign, which was first revealed Sunday by FireEye, one of its victims, centers on the Orion network monitoring software from SolarWinds, a technology firm based in Austin, Texas, that until recently had a valuation of about $1 billion. While SolarWinds may be relatively unknown, the company has 300,000 customers, of which nearly 18,000 may have been caught up in the supply chain attack, which involved attackers adding a backdoor to the company s Orion software, apparently by having infiltrated its software development pipeline (see:

SolarWinds Removes Customer List From Site as It Releases Second Hotfix

By Eduard Kovacs on December 16, 2020 SolarWinds has released a second hotfix for its Orion platform in response to the recent breach, and the company has decided to remove from its website a page listing some of its important customers. IT management and monitoring solutions provider SolarWinds revealed this week that sophisticated threat actors compromised the build system for its Orion monitoring platform, which allowed the attackers to deliver trojanized updates to the firm’s customers between March and June 2020. The hackers could then compromise the servers of the organizations that downloaded, implemented or updated Orion products in that timeframe. Shortly after news of the breach broke, the company informed customers about the availability of a hotfix, but promised to release a second hotfix that replaces the compromised component and provides additional security enhancements.

© 2025 Vimarsana

vimarsana © 2020. All Rights Reserved.