Source |
McAfee Labs |
Identifiant |
2105664 |
Date de publication |
2020-12-16 16:48:26 (vue: 2020-12-16 19:05:20) |
Titre |
SUNBURST Malware and SolarWinds Supply Chain Compromise |
Texte |
Part I of II Situation In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds's Orion IT monitoring and management software with a trojanized version of SoalrWinds.Orion.Core.BusinessLayer.dll. The trojanized file delivers the SUNBURST malware through a backdoor as part of a digitally-signed Windows Installer Patch. Use of a Compromised Software Supply […]
|
Envoyé |
Oui |
Condensat |
2020 actors appeared backdoor blog blogs businesslayer chain compromise compromised core dec delivers digitally disclosed dll file fireeye first installer malware management mcafee monitoring of soalrwinds orion part patch post released signed situation software solarwinds sunburst supply threat through trojanized use version windows |
Tags |
Malware
Threat
|
Stories |
Solardwinds
|
Notes |
|
Move |
|
Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2020-12-21 21:32:24 |
(Déjà vu) How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise (lien direct) |
In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds's Orion IT monitoring and management software with a trojanized version of SoalrWinds.Orion.Core.BusinessLayer.dll delivered as part of a digitally-signed Windows Installer Patch. The trojanized file delivers a backdoor, dubbed SUNBURST by FireEye (and Solorigate by Microsoft), that communicates to third-party servers for […]
|
Threat
Mobile
|
Solardwinds
Solardwinds
|
|