![]() ![]() “A major we’ve implemented and suggest others implement is taking away some of that control from the developers and putting it under the guise of. “In general, we give developer communities more leeway-more freedom in what machines they can use, what software they can install in their environments,” said Brown. Now what we have to do is prepare for more of those as a community.”īrown added that the company has learned lessons from the attack and subsequent four-month investigation carried out by CrowdStrike and KPMG, including limiting employee access and not trusting anyone by default. “That type of campaign isn’t your general attack that you prepare for. “A nation-state attack of this level and sophistication very patient, deliberate, targeted,” said Brown, who has been with the company since July 2017, according to LinkedIn. government agencies, including the Department of Justice and Department of Energy, as well as six EU agencies. The operatives deployed additional malware to compromise high-value networks and steal sensitive information from tens of U.S. ![]() Customers then downloaded the compromised update, giving the hackers access to potentially thousands of additional targets. In addition to formally naming Russia’s SVR as the perpetrator of the attack, the White House expelled ten diplomats and imposed a range of sanctions on Russian companies and individuals.Īccording to government officials and cybersecurity experts, the SVR was able to gain access to SolarWinds’ internal network and insert malware into a version of its Orion IT monitoring application. ![]() “We’ve had four months of inspections and we found things to fix, but it wasn’t like we were super dirty-there wasn’t sloppiness, there wasn’t malware all over our environment.”īrown’s comments come one week after the Biden administration took its biggest step yet at retaliating for the SolarWinds supply chain attack and subsequent compromise of federal and private sector networks. “We ran a pretty good shop, we had pretty good technology,” Tim Brown, the company’s CISO and vice president of security, said during a webcast hosted by the insurance firm Marsh. SolarWinds’ chief information security officer defended the company’s practices and technology on Wednesday, saying the attack it experienced at the hands of Russia’s foreign intelligence agency last year wasn’t one that most companies would be prepared for. SolarWinds security chief: ‘We ran a pretty good shop’ ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |