06 May 2021
by Neil Ashdown
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign in December 2020 to the Russian Foreign Intelligence Service (Sluzhba vneshney razvedki: SVR). The move came as part of a package of sanctions and other measures aimed at Russia. Although media coverage portrayed these actions as driven by the SolarWinds intrusion, the emphasis in official comments was broader; the White House stated that the actions were taken “to impose costs on Russia for actions by its government and intelligence services against U.S. sovereignty and interests”.
The SolarWinds campaign involved a threat actor introducing a backdoor into an update for US company SolarWinds’ Orion network management platform. SolarWinds has estimated that 18,000 of its customers were affected, including government agencies. However, of those affected, only a small number appear to have been selected for further exploitation by the actor behind the compromise.
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign...
06 May 2021
by Neil Ashdown
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign in December 2020 to the Russian Foreign Intelligence Service (Sluzhba vneshney razvedki: SVR). The move came as part of a package of sanctions and other measures aimed at Russia. Although media coverage portrayed these actions as driven by the SolarWinds intrusion, the emphasis in official comments was broader; the White House stated that the actions were taken “to impose costs on Russia for actions by its government and intelligence services against U.S. sovereignty and interests”.
The SolarWinds campaign involved a threat actor introducing a backdoor into an update for US company SolarWinds’ Orion network management platform. SolarWinds has estimated that 18,000 of its customers were affected, including government agencies. However, of those affected, only a small number appear to have been selected for further exploitation by the actor behind the compromise.
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign...
06 May 2021
by Neil Ashdown
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign in December 2020 to the Russian Foreign Intelligence Service (Sluzhba vneshney razvedki: SVR). The move came as part of a package of sanctions and other measures aimed at Russia. Although media coverage portrayed these actions as driven by the SolarWinds intrusion, the emphasis in official comments was broader; the White House stated that the actions were taken “to impose costs on Russia for actions by its government and intelligence services against U.S. sovereignty and interests”.
The SolarWinds campaign involved a threat actor introducing a backdoor into an update for US company SolarWinds’ Orion network management platform. SolarWinds has estimated that 18,000 of its customers were affected, including government agencies. However, of those affected, only a small number appear to have been selected for further exploitation by the actor behind the compromise.
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign...
06 May 2021
by Neil Ashdown
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign in December 2020 to the Russian Foreign Intelligence Service (Sluzhba vneshney razvedki: SVR). The move came as part of a package of sanctions and other measures aimed at Russia. Although media coverage portrayed these actions as driven by the SolarWinds intrusion, the emphasis in official comments was broader; the White House stated that the actions were taken “to impose costs on Russia for actions by its government and intelligence services against U.S. sovereignty and interests”.
The SolarWinds campaign involved a threat actor introducing a backdoor into an update for US company SolarWinds’ Orion network management platform. SolarWinds has estimated that 18,000 of its customers were affected, including government agencies. However, of those affected, only a small number appear to have been selected for further exploitation by the actor behind the compromise.
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign...
06 May 2021
by Neil Ashdown
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign in December 2020 to the Russian Foreign Intelligence Service (Sluzhba vneshney razvedki: SVR). The move came as part of a package of sanctions and other measures aimed at Russia. Although media coverage portrayed these actions as driven by the SolarWinds intrusion, the emphasis in official comments was broader; the White House stated that the actions were taken “to impose costs on Russia for actions by its government and intelligence services against U.S. sovereignty and interests”.
The SolarWinds campaign involved a threat actor introducing a backdoor into an update for US company SolarWinds’ Orion network management platform. SolarWinds has estimated that 18,000 of its customers were affected, including government agencies. However, of those affected, only a small number appear to have been selected for further exploitation by the actor behind the compromise.
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign...
06 May 2021
by Neil Ashdown
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign in December 2020 to the Russian Foreign Intelligence Service (Sluzhba vneshney razvedki: SVR). The move came as part of a package of sanctions and other measures aimed at Russia. Although media coverage portrayed these actions as driven by the SolarWinds intrusion, the emphasis in official comments was broader; the White House stated that the actions were taken “to impose costs on Russia for actions by its government and intelligence services against U.S. sovereignty and interests”.
The SolarWinds campaign involved a threat actor introducing a backdoor into an update for US company SolarWinds’ Orion network management platform. SolarWinds has estimated that 18,000 of its customers were affected, including government agencies. However, of those affected, only a small number appear to have been selected for further exploitation by the actor behind the compromise.
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign...
06 May 2021
by Neil Ashdown
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign in December 2020 to the Russian Foreign Intelligence Service (Sluzhba vneshney razvedki: SVR). The move came as part of a package of sanctions and other measures aimed at Russia. Although media coverage portrayed these actions as driven by the SolarWinds intrusion, the emphasis in official comments was broader; the White House stated that the actions were taken “to impose costs on Russia for actions by its government and intelligence services against U.S. sovereignty and interests”.
The SolarWinds campaign involved a threat actor introducing a backdoor into an update for US company SolarWinds’ Orion network management platform. SolarWinds has estimated that 18,000 of its customers were affected, including government agencies. However, of those affected, only a small number appear to have been selected for further exploitation by the actor behind the compromise.
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign...
06 May 2021
by Neil Ashdown
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign in December 2020 to the Russian Foreign Intelligence Service (Sluzhba vneshney razvedki: SVR). The move came as part of a package of sanctions and other measures aimed at Russia. Although media coverage portrayed these actions as driven by the SolarWinds intrusion, the emphasis in official comments was broader; the White House stated that the actions were taken “to impose costs on Russia for actions by its government and intelligence services against U.S. sovereignty and interests”.
The SolarWinds campaign involved a threat actor introducing a backdoor into an update for US company SolarWinds’ Orion network management platform. SolarWinds has estimated that 18,000 of its customers were affected, including government agencies. However, of those affected, only a small number appear to have been selected for further exploitation by the actor behind the compromise.
The US and UK governments on 15 April 2021 attributed the high-profile SolarWinds intrusion campaign...