Security News > 2021 > February > China-Linked Hackers Exploited SolarWinds Flaw in U.S. Government Attack: Report

Hackers believed to be from China have exploited a vulnerability in a SolarWinds product as part of a campaign targeting at least one U.S. government agency, Reuters reported on Tuesday.
In late December, a few weeks after it came to light that Texas-based IT management solutions provider SolarWinds was targeted in a sophisticated supply chain attack, researchers from several organizations revealed that one of the pieces of malware they had analyzed, dubbed Supernova, had apparently been used by a second group that was not related to the supply chain attack.
The supply chain attack, which has been linked to Russian threat actors, involved a breach of SolarWinds systems and the delivery of malware through updates for the company's Orion monitoring product.
SolarWinds patched the vulnerability involved in the Supernova attack in December.
SolarWinds told Reuters that it's only aware of a single customer being targeted with the Supernova malware, but it did not name the customer and said it could not conclusively determine who was behind the attack.
While SolarWinds enabled hackers to gain access to the systems of many organizations through the supply chain attack, the U.S. Cybersecurity and Infrastructure Security Agency reported recently that many of the entities targeted by this threat actor actually had no direct link to SolarWinds - roughly 30% of identified victims did not use the company's products.
News URL
Related news
- Chinese hackers targeted sanctions office in Treasury attack (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- Hackers game out infowar against China with the US Navy (source)
- Google takes action after coder reports 'most sophisticated attack I've ever seen' (source)
- Google says hackers abuse Gemini AI to empower their attacks (source)
- Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant' (source)
- Hacker pleads guilty to SIM swap attack on US SEC X account (source)
- whoAMI attacks give hackers code execution on Amazon EC2 instances (source)
- Microsoft: Hackers steal emails in device code phishing attacks (source)