Microsoft and FireEye Spell Out New Malware Strains Tied to SolarWinds Actor
Three top Russian language forums hacked, Star Alliance of Airlines IT operator hacked, Supermicro and Pulse Secure say some of their motherboards are vulnerable to Trickboot, and more
Plug: Virginia became the second state in the nation after California to pass a data protection law, which could spark other states to pass their own laws quickly. Check out my latest column on the subject.
Microsoft and FireEye published separate reports detailing new malware strains tied to the SolarWinds’ threat actor. Microsoft identified three new strains, including GoldMax, a Go-based backdoor that FireEye calls SUNSHUTTLE, three different variants of a VBScript malware strain called Sibot, and another Go-based malware strain called Goldfinger.
Microsoft said the new strains were linked to the threat actor, which they have now named Nobelium. The software and security giant said it found the three malware strains on some of its customers' networks that were compromised by Nobelium last year, some implanted as far back as June 2020.
Related: Dark Reading, The Record by Recorded Future, DataBreachToday.com, GovInfoSecurity.com, Bleeping Computer, SC Magazine, Threatpost, Cyberscoop,
Keep reading with a 7-day free trial
Subscribe to Metacurity to keep reading this post and get 7 days of free access to the full post archives.