Article 5DG9K 30% of “SolarWinds hack” victims didn’t actually use SolarWinds

30% of “SolarWinds hack” victims didn’t actually use SolarWinds

by
Jim Salter
from Ars Technica - All content on (#5DG9K)
NASA_mission_Wind_Solar_Wind_Workhorse_M

Enlarge / This is an artist's concept of Wind, a NASA spacecraft which spent twenty years gathering data on the solar wind (no relation). (credit: US Department of State)

When security firm Malwarebytes announced last week that it had been targeted by the same attacker that compromised SolarWinds' Orion software, it noted that the attack did not use SolarWinds itself. According to Malwarebytes, the attacker had used "another intrusion vector" to gain access to a limited subset of company emails.

Brandon Wales, acting director of the US Cybersecurity and Infrastructure Agency (CISA), said nearly a third of the organizations attacked had no direct connection to SolarWinds.

[The attackers] gained access to their targets in a variety of ways. This adversary has been creative... it is absolutely correct that this campaign should not be thought of as the SolarWinds campaign.

Many of the attacks gained initial footholds by password spraying to compromise individual email accounts at targeted organizations. Once the attackers had that initial foothold, they used a variety of complex privilege escalation and authentication attacks to exploit flaws in Microsoft's cloud services. Another of the Advanced Persistent Threat (APT)'s targets, security firm CrowdStrike, said the attacker tried unsuccessfully to read its email by leveraging a compromised account of a Microsoft reseller the firm had worked with.

Read 2 remaining paragraphs | Comments

index?i=ljRT9rULL7Q:j_NrilXEQMY:V_sGLiPB index?i=ljRT9rULL7Q:j_NrilXEQMY:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments