DOJ, Companies Spotted SolarWinds Breach Six Months Earlier Than Reported
Man sentenced for stealing more than 712 Bitcoin, FBI warrantless searches drop dramatically, Cyber Command searching social media to defend NATO brand, Top Oz law firm hit by BlackCat, much more
Check out my latest CSO column that examines the growing alignment between misinformation and malware.
Underscoring the importance of information-sharing among agencies and industry, the US Justice Department, Mandiant, and Microsoft came across a Russian espionage team’s breach of SolarWinds six months earlier than previously reported but were unaware of the significance of what they had found.
The breach, which compromised the software maker SolarWinds and which went on to infect at least nine US federal agencies and 18,000 organizations with malware, was publicly announced in December 2020. But, the DOJ discovered the operation six months earlier, in late May 2020, even though the scale and significance of the breach weren’t immediately apparent.
Suspicions were triggered when the department detected unusual traffic from one of its servers running a trial version of the Orion software suite made by SolarWinds, according to sources familiar with the inc…
Keep reading with a 7-day free trial
Subscribe to Metacurity to keep reading this post and get 7 days of free access to the full post archives.