Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the updraftplus domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/html/dev.webpronews.com/public_html/wp-includes/functions.php on line 6114
SolarWinds Attack More Widespread, 30% Of Victims Did Not Use Software «

SolarWinds Attack More Widespread, 30% Of Victims Did Not Use Software

A troubling detail has come to light as part of the SolarWinds investigation, namely that 30% of victims didn’t use the software in question....
SolarWinds Attack More Widespread, 30% Of Victims Did Not Use Software
Written by Matt Milano

A troubling detail has come to light as part of the SolarWinds investigation, namely that 30% of victims didn’t use the software in question.

The SolarWinds attack was one of the worst cybersecurity breaches in US history. Hackers compromised SolarWinds’ Orion IT software, injecting a trojan that allowed them to target companies and organizations using the software. The attack was what is known as a supply chain attack, as it compromised legitimate software in the supply chain, before it could be distributed.

According to new information, however, it appears the hackers behind the attack were not relying solely on SolarWinds software since roughly 30% of victims weren’t using it.

The hackers “gained access to their targets in a variety of ways. This adversary has been creative,” Brandon Wales, acting director of the Cybersecurity and Infrastructure Security Agency, told The Wall Street Journal. “It is absolutely correct that this campaign should not be thought of as the SolarWinds campaign.”

The revelation casts a new light on the attack, and the ingenuity the hackers demonstrated, as well as the threat they pose.

Subscribe for Updates

CybersecurityUpdate Newsletter

CybersecurityUpdate

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.
Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit