Security News > 2020 > December > SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year
In an 8-K filing to the US Securities and Exchange Commission, SolarWinds has given more details on exactly how it learned its servers were spewing out malware.
Security shop FireEye, as well as other sources, have confirmed that the main malware controller being used in the SolarWinds attack has been killed off this week.
Hackers unknown, believed to be state-sponsored, have been romping through some 18,000 of SolarsWinds' Origin customer servers using malware installed via an update server.
"Sunburst is the malware that was distributed through SolarWinds software. As part of FireEye's analysis of Sunburst, we identified a killswitch that would prevent Sunburst from continuing to operate," the company told The Reg.
"Our hypothesis is that either the extensions were deliberately created with the malware built in, or the author waited for the extensions to become popular, and then pushed an update containing the malware," said Jan Rubín, malware researcher at Avast.
News URL
https://go.theregister.com/feed/www.theregister.com/2020/12/21/in_brief_security/
Related news
- Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining (source)
- North Korean govt hackers linked to Play ransomware attack (source)
- Hackers increasingly use Winos4.0 post-exploitation kit in attacks (source)
- Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks (source)
- Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations (source)
- Hackers breach US firm over Wi-Fi from Russia in 'Nearest Neighbor Attack' (source)
- North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks (source)
- Russian hackers hijack Pakistani hackers' servers for their own attacks (source)
- Russian hackers hijack Pakistani hackers' servers for their own attacks (source)
- 390,000 WordPress accounts stolen from hackers in supply chain attack (source)