Breach, Cloud Security, Cloud Security, Data Security

SolarWinds Shares More Information on Cyberattack Impact, Initial Access Vector

SolarWinds has provided further information on the major data breach it disclosed in late 2020, which is now officially attributed to actors affiliated with the Russian Foreign Intelligence Service, according to SecurityWeek.

The threat actors gained access to SolarWinds’ Orion software through its automated build environment and began testing their ability to inject malicious code into builds in October 2019, before rolling out malicious updates, which were named SUNBURST, to customers between March and June the following year.

In its blog post, SolarWInds said it estimates less than 100 customers were targeted with SUNBURST malware, which was in line with estimates given by the U.S. government and other researchers. Additionally, the company said no source code repository was modified in the attack and there were no signs of the SUNBURST in any of its other products.

The company offered three possible access points that enabled the attackers’ breach: a zero-day flaw in a third-party app or device, a social engineering campaign or a brute-force attack.

“Our investigations have uncovered evidence that the threat actor compromised credentials and conducted research and surveillance in furtherance of its objectives through persistent access to our software development environment and internal systems,” the company said.

An In-Depth Guide to Cloud Security

Get essential knowledge and practical strategies to fortify your cloud security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds