Solarwinds teamcity4/2/2023 ![]() ![]() Update – Janu– According to our latest analysis results and the publicly available details, there is a possibility that the SUNBURST/ECLIPSER breach involved a *broader/multi-stage* supply chain attack with potentially some of the tertiary supply chain vendor (JetBrains) build process components, such as, e.g. īelow is a summary of what we currently know about the high-profile SolarWinds Orion/ECLIPSER attacks and our recommendations on some possible Securonix predictive indicators/security analytics to increase your chances of detecting the current/future variants of the attacks involving the stolen tools as well as leveraging some of the known and unknown associated attack vectors/CVEs. The Securonix Threat Research (STR) team has been actively investigating the critical ongoing SolarWinds Orion/SUNBURST supply chain attacks (monitored by STR as ECLIPSER) with some of the recent victims being one of the leading security vendors as well as a number of US government entities and other victims targeted as part of attacks involving the compromised SolarWind Orion IT software. Sources: ChannelE2E and MSSP Alert.Ĭontinue to page two for earlier timeline dates.By Oleg Kolesnikov and Den Iuzvyk, Securonix Threat Research Teamįigure 1: Example of Trojanized SolarWinds With Embedded Malicious Payload Activity in Logs Also, the N-able (formerly SolarWinds MSP) spin-out is on track for Q2, 2021. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |