To embed, copy and paste the code into your website or blog:
On the heels of the concerning security incident experienced by FireEye [view related post], during the investigation of its own incident, FireEye discovered that multiple updates issued by SolarWinds, a cybersecurity firm that many governmental and private companies use to monitor networks, were “trojanized” and malware was inserted into the updates between March and May of 2020.
The malware allowed Russian operatives to hack into several governmental agencies, including the Departments of Homeland Security (DHS), State, National Institutes of Health, Commerce (National Telecommunications and Information Administration Office) and Treasury. In addition, it is reported that the Departments of Justice and Defense also were customers of SolarWinds. The DHS’s Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to all government agencies to disconnect and stop using SolarWinds.
To embed, copy and paste the code into your website or blog:
On December 13, the software and service provider SolarWinds announced that its Orion software platform had been the target of a sophisticated cyber-attack that may have resulted in malicious code being pushed to as many as 18,000 customers. The SolarWinds software is used by many corporate and not-for-profit entities of all sizes to monitor the health of their IT networks. Although the details of this breach are still unfolding, based on the information currently available, Orion users who updated their software between March and June of this year are potentially affected.
Legal Disclaimer
You are responsible for reading, understanding and agreeing to the National Law Review s (NLR’s) and the National Law Forum LLC s Terms of Use and Privacy Policy before using the National Law Review website. The National Law Review is a free to use, no-log in database of legal and business articles. The content and links on www.NatLawReview.com are intended for general information purposes only. Any legal analysis, legislative updates or other content and links should not be construed as legal or professional advice or a substitute for such advice. No attorney-client or confidential relationship is formed by the transmission of information between you and the National Law Review website or any of the law firms, attorneys or other professionals or organizations who include content on the National Law Review website. If you require legal or professional advice, kindly contact an attorney or other suitable professional advisor.
Google’s antitrust pile-on continues
Presented by Facebook
With help from Cristiano Lima, John Hendel, Melissa Heikkilä and Caitlin Oprysko
Editor’s Note: Morning Tech is a free version of POLITICO Pro Technology s morning newsletter, which is delivered to our subscribers each morning at 6 a.m. The POLITICO Pro platform combines the news you need with tools you can use to take action on the day’s biggest stories.
Quick Fix It ain’t over ‘til it’s over: A group of states led by Colorado and Nebraska could file an antitrust lawsuit against Google over its power in search as soon as today on the heels of separate suits lodged by other states this week and the Trump administration this fall.
15 December 2020, 9:17 pm EST By
Russians are the alleged top suspects behind the massive hacking, which was initially discovered among email trails from the US Treasury and Commerce Department s NTIA. However, it was recently discovered that three US agencies, including the US State Department, Department of Homeland Security (DHS), and the Department of Defense, were part of the SolarWinds breach.
The country is investigating the matter, including public and private businesses who are clients using SolarWinds services for cybersecurity, which have been hit with one of the nastiest hacks to cap off this year. The recent breach on the country s agencies is considered one of the most considerable hacking against the US for several years now.