Security News > 2020 > December > SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year
In an 8-K filing to the US Securities and Exchange Commission, SolarWinds has given more details on exactly how it learned its servers were spewing out malware.
Security shop FireEye, as well as other sources, have confirmed that the main malware controller being used in the SolarWinds attack has been killed off this week.
Hackers unknown, believed to be state-sponsored, have been romping through some 18,000 of SolarsWinds' Origin customer servers using malware installed via an update server.
"Sunburst is the malware that was distributed through SolarWinds software. As part of FireEye's analysis of Sunburst, we identified a killswitch that would prevent Sunburst from continuing to operate," the company told The Reg.
"Our hypothesis is that either the extensions were deliberately created with the malware built in, or the author waited for the extensions to become popular, and then pushed an update containing the malware," said Jan Rubín, malware researcher at Avast.
News URL
https://go.theregister.com/feed/www.theregister.com/2020/12/21/in_brief_security/
Related news
- CISA warns critical SolarWinds RCE bug is exploited in attacks (source)
- Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks (source)
- Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware Attack (source)
- Russian military hackers linked to critical infrastructure attacks (source)
- U.S. Offers $10 Million for Info on Russian Cadet Blizzard Hackers Behind Major Attacks (source)
- Chinese hackers use new data theft malware in govt attacks (source)
- SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks (source)
- Hackers deploy AI-written malware in targeted attacks (source)
- N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks (source)
- North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks (source)