

- #Orion solarwinds associate multiple ips to node full
- #Orion solarwinds associate multiple ips to node software
We must learn from this and act, as a global industry. This attack is only the beginning, and it’s why we must act now. The scary thought is that now other nation-state actors and criminal organizations can reuse this technique and weaponize the tactics for further malicious attacks, ones that could be even more devastating. Now we must work vigorously to identify others that leverage similar tactics. It is possible that this is just one of many compromised supply chains. They are just one small piece of a much bigger puzzle. This reduces the possibility of attribution and sometimes even forces misdirection. Based on my previous experience it may even be that some of the attackers did not know fully what they were looking for. These would have been separated based on campaign motives, such as espionage, intelligence gathering, IP theft, and potentially even staging for future preemptive strikes. This points to a nation-state or nation state-backed operation.ĭifferent attacker teams would have tackled different tasks, such as Infrastructure operations, payload, targeting, and exfiltration. Given the techniques used within this sophisticated attack, it’s highly likely that there were several motives, and that dedicated teams were behind this massive attack. This helps me put myself into the mind of the cyber attacker. What is the possible impact and motive for attacking supply chains?Īs an Incident Response professional, I always look for the motive of the attack. The Latest from the SolarWinds Sunburst Breach Listen to our 401 Access Denied Podcast for news on the breach: I’ve been involved in analyzing many major cyber attacks over the past 15 years, and this is close to the top of my list of the most serious. The preparation will have likely taken several years of testing, planning, staging, and executing. There was unlimited time, expert resources, financial backing, and creativity behind this attack. It attempted to stay covert tracks were hidden.
#Orion solarwinds associate multiple ips to node full
It requires a full industry collaborative effort.Īs we analyzed the details and timeline of this attack, we realize it was truly sophisticated. We cannot sit back and let this one pass by. This is a reminder that we must do more to curtail cyber attacks, and we must do it together, as an industry. What I mean by that is if you are a customer of one of the victims or have a partnership, or they are a supplier to your business, it could even be possible that the attackers moved deeper into their victims’ networks or accessed their customer data.

Even if you do not use SolarWinds software, this breach could still impact you.

We will likely be talking about it for years to come. I cannot emphasize enough the far-reaching implications of this security incident. The attackers then targeted high-profile targets with Stage Two, such as Microsoft, FireEye, and government agencies.Įven if you do not use SolarWinds software, this breach could still impact you It’s an assault against many public and private companies, affecting approximately 18,000 victims globally, many of which were Stage One victims. His words during the CES technology trade show keynote should not be taken casually.
#Orion solarwinds associate multiple ips to node software
It’s a true “ mass indiscriminate global assault” as quoted by Brad Smith whom I regard as one of the most respected software leaders. This attack is a wake-up call for the software industry. Over the past weeks, we’ve learned more about one of the biggest cyber attack on the software industry supply chain.
