3/29/2024 0 Comments Solarwinds attackThe attacker was then able to silently spy on several activities across these customers. When the software was updated through the normal updating processes set up by SolarWinds, the backdoored software was deployed into customer systems - including numerous US government agencies. Did it mean, perhaps, that attackers could inject backdoor processes into Microsoft’s updating processesįirst, a bit of background on the SolarWinds attack, also called Solorigate: An attacker got into a remote management/monitoring tool company and was able to inject itself into the development process and build a backdoor. (Normally, only key government customers and trusted partners would have this level of access to the “stuff” of which Windows is made.) The attackers were able to read – but not change – the software secret sauce, raising questions and concerns among Microsoft customers. Microsoft recently announced that its Windows source code had been viewed by the SolarWinds attackers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |