• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Internet

30% of “Solarwinds hack” victims didn’t actually use Solarwinds

January 29, 2021
Share on FacebookShare on Twitter

Enlarge / This is an artist’s concept of Wind, a NASA spacecraft which spent twenty years gathering data on the solar wind (no relation).

When security firm Malwarebytes announced last week that it had been targeted by the same attacker that compromised Solarwinds’ Orion software, it noted that the attack did not use Solarwinds itself. According to Malwarebytes, the attacker had used “another intrusion vector” to gain access to a limited subset of company emails.

Brandon Wales, acting director of the US Cybersecurity and Infrastructure Agency (CISA), said nearly a third of the organizations attacked had no direct connection to Solarwinds.

[The attackers] gained access to their targets in a variety of ways. This adversary has been creative… it is absolutely correct that this campaign should not be thought of as the Solarwinds campaign.

Many of the attacks gained initial footholds by password spraying to compromise individual email accounts at targeted organizations. Once the attackers had that initial foothold, they used a variety of complex privilege escalation and authentication attacks to exploit flaws in Microsoft’s cloud services. Another of the Advanced Persistent Threat (APT)’s targets, security firm CrowdStrike, said the attacker tried unsuccessfully to read its email by leveraging a compromised account of a Microsoft reseller the firm had worked with.

Advertisement

According to the Wall Street Journal, Solarwinds is now investigating the possibility that these Microsoft flaws were the APT’s first vector into its own organization. In December, Microsoft said the APT in question had accessed its own corporate network and viewed internal source code—but that it found “no indications that our systems were used to attack others.” At that time, Microsoft had identified more than 40 attacks on its customers, a number which has increased since.

Microsoft’s Corporate VP of Security, Compliance, and Identity Vasu Jakkal told ZDNet that the “Solarwinds” campaign isn’t an isolated emergency so much as the new normal, saying, “These attacks are going to continue to get more sophisticated. So we should expect that. This is not the first and not the last. This is not an outlier. This is going to be the norm.

Next Post

Good Lock modules ClockFace, MultiStar, and Home Up gain One UI 3 support

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • Amazon Spring Sale: Save $500 on this Samsung 40-inch G7 gaming monitor
  • I’m saying it: The Galaxy S26 is a better ‘Pixel’ than the Pixel 10
  • Europe’s top funding rounds this week (23–29 March)
  • Best Amazon Spring Sale TV deal 2026: Save $800 on this Samsung 65-inch OLED TV
  • Hell is Us rated for Nintendo Switch 2

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously