Get Permission
Researchers with Microsoft and FireEye are disclosing additional malware used by the hacking group that targeted SolarWinds in December 2020, according to a pair of reports released Thursday.
The newly discovered malware appears to be second-stage payloads deployed by the hacking group after victimized organizations downloaded a Trojanized software update to SolarWind s Orion network monitoring platform, which contained a backdoor dubbed Sunburst, the reports note. While about 18,000 of the company s customers downloaded the compromised software update, the attackers only deployed additional malware against certain organizations.
Both Microsoft and FireEye found these newly discovered second-stage malware variants were likely deployed in the later stages of the supply chain attack, most likely around August or September 2020. The attackers appear to have first compromised the SolarWinds network in September 2019 and then inserted the Sunburst backdoor in the soft
The telltale signs of gentrification aren’t hard to spot: real estate investors buying houses, rents soaring, housing prices skyrocketing, longtime residents getting displaced. And they’re all evident in the Grove Park neighborhood of Atlanta, making it part of a national pattern long mired in race, class, and not-in-my-backyard policies.
Debra Edelson, executive director of the Grove Park Foundation, describes the process as “white money pushing out Black people.”
Zoning, rent control, property-tax breaks, and taxpayer-funded affordable housing have long been used to manage growth and keep neighborhoods diverse. But new research shows the long-term failure of such tools to temper change.
Microsoft President Brad Smith will testify at the upcoming House hearings that will discuss tech antitrust and the news and media. Smith has been a vocal supporter of laws related to these topics.
Get Permission
Researchers with Microsoft and FireEye are disclosing additional malware used by the hacking group that targeted SolarWinds in December 2020, according to a pair of reports released Thursday.
The newly discovered malware appears to be second-stage payloads deployed by the hacking group after victimized organizations downloaded a Trojanized software update to SolarWind s Orion network monitoring platform, which contained a backdoor dubbed Sunburst, the reports note. While about 18,000 of the company s customers downloaded the compromised software update, the attackers only deployed additional malware against certain organizations.
Both Microsoft and FireEye found these newly discovered second-stage malware variants were likely deployed in the later stages of the supply chain attack, most likely around August or September 2020. The attackers appear to have first compromised the SolarWinds network in September 2019 and then inserted the Sunburst backdoor in the soft
Researchers Disclose More Malware Used in SolarWinds Attack govinfosecurity.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from govinfosecurity.com Daily Mail and Mail on Sunday newspapers.