<?xml version="1.0" encoding="UTF-8"?>

<rss version="2.0"
 xmlns:blogChannel="http://backend.userland.com/blogChannelModule"
>

<channel>
<title>Topic &#x27;Solarwinds &#x22;Orion&#x22; may be compromised,linked to FireEye?&#x27; in forum &#x27;Security&#x27; - dslreports.com</title>
<link>http://www.dslreports.com/forum/Solarwinds-Orion-may-be-compromisedlinked-to-FireEye-32970183</link>
<description></description>
<language>en</language>
<pubDate>Fri, 25 Mar 2022 10:37:00 EDT</pubDate>
<lastBuildDate>Fri, 25 Mar 2022 10:37:00 EDT</lastBuildDate>

<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33227943</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.theregister.com/2021/10/07/solarwinds_russia_us_counterintelligence_details/" >www.theregister.com/2021 &middot;&middot;&middot; details/</A> -- Russian spies reportedly used SolarWinds hack to steal US counterintelligence details<BLOCKQUOTE><SMALL>quote:</SMALL><HR>Russia's SVR spy agency made off with information about US counterintelligence investigations in the wake of the SolarWinds hack, according to people familiar with the American government cleanup operation.  The alarming snippet was reported by financial newswire Reuters. The SVR was named and shamed in April by Britain and the US as the organisation that compromised the build systems of SolarWinds' network monitoring software Orion, used by 18,000 customers across the world. Those customers included the UK and US governments, among many, many others.  The attack is said to have led to the Russian foreign intelligence service making off with "information about counterintelligence investigations, policy on sanctioning Russian individuals and the country's response to COVID-19," according to people involved in the US government's investigation who spoke to Reuters.  It was also reported that the SVR stole software signing certificates so their software could be run on them.  The attackers compromised SolarWinds' build servers, inserting a backdoor into the next version of the software that was distributed through trusted channels as part of a scheduled, routine update. They spent months covering their tracks and lying low to see if they'd been detected; it took even US infosec behemoth FireEye months to realise what had happened on its own networks.  Russia attempted to deny involvement in the compromise of SolarWinds' Orion network management 'n' monitoring product, though there was little room for doubt in the emphatic statements issued by the UK and US in April – along with their expulsion of known Russian spies from their territories as a mark of disapproval.<HR></BLOCKQUOTE>TheReg doesn't link to the Reuters article directly, but I think it's this one here : &raquo;<A HREF="https://www.reuters.com/world/us/hackers-solarwinds-breach-stole-data-us-sanctions-policy-intelligence-probes-2021-10-07/" >www.reuters.com/world/us &middot;&middot;&middot; 1-10-07/</A> -- Hackers of SolarWinds stole data on U.S. sanctions policy, intelligence probes <BLOCKQUOTE><SMALL>quote:</SMALL><HR>SAN FRANCISCO, Oct 7 (Reuters) - The suspected Russian hackers who used SolarWinds and Microsoft software to burrow into U.S. federal agencies emerged with information about counter-intelligence investigations, policy on sanctioning Russian individuals and the country’s response to COVID-19, people involved in the investigation told Reuters.  The hacks were widely publicized after their discovery late last year, and American officials have blamed Russia’s SVR foreign intelligence service, which denies the activity. But little has been disclosed about the spies' aims and successes.  The reluctance of some publicly traded companies to explain their exposure has prompted a broad <A HREF="https://www.reuters.com/technology/exclusive-wide-ranging-solarwinds-probe-sparks-fear-corporate-america-2021-09-10" >Securities and Exchange Commission inquiry.</A>  The campaign alarmed officials with its stealth and careful staging. The hackers burrowed into the code production process at SolarWinds (SWI.N), which makes widely used software for managing networks.<HR></BLOCKQUOTE>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33227943</guid>
<pubDate>Thu, 07 Oct 2021 17:56:42 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33199962</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.theregister.com/2021/09/02/autodesk_solarwinds_hack_victim/" >www.theregister.com/2021 &middot;&middot;&middot; _victim/</A> -- Autodesk was one of the 18,000 firms breached in SolarWinds attack, firm admits<BLOCKQUOTE><SMALL>quote:</SMALL><HR>Autodesk, makers of computer-aided design (CAD) software for manufacturing, has told the US stock market it was targeted as part of the the supply chain attack on SolarWinds' Orion software.  In a filing with the American Stock Exchange Commission, Autodesk said it had identified a compromised server in the wake of public reporting of the SolarWinds breach.  While Autodesk went on to say that it found no further disruption on its systems, its mention of the breach in its latest quarterly results reminds the world just how far-reaching the SolarWinds supply chain compromise was. Around 18,000 of its customers were affected, though the malware gang only infiltrated the most important users of Orion – including FireEye.  In its <A HREF="https://www.sec.gov/ix?doc=/Archives/edgar/data/769397/000076939721000075/adsk-20210731.htm" >Form 10-Q for Q2 2021,</A> for the quarter ended 31 July, Autodesk said:<BLOCKQUOTE><SMALL>quote:</SMALL><HR>We identified a compromised SolarWinds server and promptly took steps to contain and remediate the incidents. While we believe that no customer operations or Autodesk products were disrupted as a result of this attack, other, similar attacks could have a significant negative impact on our systems and operations.<HR></BLOCKQUOTE>We have asked Autodesk for further comment.<HR></BLOCKQUOTE>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33199962</guid>
<pubDate>Thu, 02 Sep 2021 17:32:23 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33177088</link>
<description><![CDATA[ashrc4 posted : If 86% renewed it implies acceptance of trust in now said product. Penalty is to be decided for any lapse. Don't  know what a leaked password and account unaccounted for is worth. <br>What choices they made business wise was just that.<br>Unless their buying more stock as we speak.  :huh:<br> ]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33177088</guid>
<pubDate>Thu, 05 Aug 2021 02:30:21 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33176661</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.theregister.com/2021/08/04/solarwinds_lawsuit_shareholders_motion_dismiss/" >www.theregister.com/2021 &middot;&middot;&middot; dismiss/</A> -- SolarWinds urges US judge to toss out crap infosec sueball: We got pwned by actual Russia, give us a break<BLOCKQUOTE><SMALL>quote:</SMALL><HR>SolarWinds is urging a US federal judge to throw out a lawsuit brought against it by aggrieved shareholders who say they were misled about its security posture in advance of the infamous Russian attack on the business.  <b>Insisting that it was "the victim of the most sophisticated cyberattack in history" in a court filing,</b> SolarWinds described a lawsuit from some of its smaller shareholders as an attempt to "convert this sophisticated cyber-crime" into an unrelated securities fraud court case.  "The Court should dismiss the Complaint because it fails to satisfy the heightened standards for pleading a Section 10(b) claim imposed by the Private Securities Litigation Reform Act," it <A HREF="https://regmedia.co.uk/2021/08/04/solarwinds_dismissal_motion.pdf" >said</A> [PDF].  Financial newswire Reuters <A HREF="https://www.reuters.com/legal/litigation/solarwinds-says-shareholders-cyber-disclosure-lawsuit-fails-2021-08-03/" >reported</A> that the suit was originally filed over <b>allegations that former SolarWinds chief exec Kevin Thompson cut cybersecurity efforts in the hope of driving greater dividends</b> into the pockets of major investors, Silver Lake and Thoma Bravo, who each reportedly held around 40 per cent of SolarWinds' stocks at the time.  In the wake of the attack, SolarWinds' share price crashed from $24.83 to $14.95. It has rallied over the past few months back to $22.64 at the time of writing.<HR></BLOCKQUOTE>Cheap, Fast, Perfect, Ready By Yesterday... get on it, Chop Chop! :uhh: :uhh:  Story of life in the CxO suite.<br><br>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33176661</guid>
<pubDate>Wed, 04 Aug 2021 15:34:23 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33175307</link>
<description><![CDATA[ashrc4 posted : Bottom line just get on with B3W they can shove the smokeless gun up their own ______.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33175307</guid>
<pubDate>Mon, 02 Aug 2021 21:09:15 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33175108</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://apnews.com/article/technology-europe-russia-election-2020-5486323e455277b39cd3283d70a7fd64" >apnews.com/article/techn &middot;&middot;&middot; 70a7fd64</A> -- Justice Department says Russians hacked federal prosecutors<BLOCKQUOTE><SMALL>quote:</SMALL><HR><b>The Russian hackers behind the massive SolarWinds cyberespionage campaign</b> broke into the email accounts of some of the most prominent federal prosecutors’ offices around the country last year, the Justice Department said Friday.  The department said 80% of Microsoft email accounts used by employees in the four U.S. attorney offices in New York were breached. All told, the Justice Department said 27 U.S. Attorney offices had at least one employee’s email account compromised during the hacking campaign.  The Justice Department said in a statement that <b>it believes the accounts were compromised from May 7 to Dec. 27, 2020. Such a timeframe is notable because the SolarWinds campaign,</b> which infiltrated dozens of private-sector companies and think tanks as well as at least nine U.S. government agencies, was first discovered and publicized in mid-December.  The Administrative Office of U.S. Courts confirmed in January that it was also breached, giving the SolarWinds hackers another entry point to steal confidential information like trade secrets, espionage targets, whistleblower reports and arrest warrants.  The Justice Department did not provide additional detail about what kind of information was taken and what impact such a hack may have on ongoing cases. Members of Congress have expressed frustration with the Biden administration for not sharing more information about the impact of the SolarWinds campaign.<HR></BLOCKQUOTE>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33175108</guid>
<pubDate>Mon, 02 Aug 2021 17:14:52 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33142118</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.theregister.com/2021/06/22/sec_continues_to_probe_solarwinds/" >www.theregister.com/2021 &middot;&middot;&middot; arwinds/</A> -- SEC still digging into SolarWinds fallout, nudges undeclared victims<BLOCKQUOTE><SMALL>quote:</SMALL><HR>US markets watchdog the Securities and Exchanges Commission (SEC) has begun a probe into last year's SolarWinds cyberattack, in a bid to find out who else might have been compromised.  Unnamed sources familiar with the investigation <A HREF="https://www.reuters.com/technology/us-sec-official-says-agency-has-begun-probe-cyber-breach-by-solarwinds-2021-06-21/" >have told Reuters</A> the US financial regulator recently sent out letters to businesses seeking clarification, amid concerns that not everyone has come clean.  The news agency also said the SEC is keen to know whether "public companies that had been victims had experienced a lapse of internal controls, and related information on insider trading", which could also involve issues around data protection.  No one from the SEC was available for comment at the time of writing, although El Reg was interested to read that the market and securities watchdog recently <A HREF="https://www.sec.gov/news/press-release/2021-106" >paid out $5.3m to whistleblowers</A> in two separate cases for providing "information and assistance in separate enforcement proceedings."<HR></BLOCKQUOTE>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33142118</guid>
<pubDate>Tue, 22 Jun 2021 19:31:25 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33114705</link>
<description><![CDATA[mmmdonuts posted : Just for fun read Sergei's statement in a Russian accent. Then it becomes clear they did it. ;-)]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33114705</guid>
<pubDate>Tue, 18 May 2021 21:01:08 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33114629</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.theregister.com/2021/05/18/russian_spymaster_solarwinds/" >www.theregister.com/2021 &middot;&middot;&middot; arwinds/</A> -- Us? Pwn SolarWinds? With our reputation? Russian spy chief makes laughable denial of supply chain attack<br>&raquo;<A HREF="https://www.bbc.co.uk/news/av/world-europe-57144297" >www.bbc.co.uk/news/av/wo &middot;&middot;&middot; 57144297</A><BLOCKQUOTE><SMALL>quote:</SMALL><HR>A Russian spymaster has denied that his agency carried out the infamous SolarWinds supply chain attack in a public relations move worthy of the Internet Research Agency.  Sergei Naryshkin, head of the SVR spy agency, made his denial in a BBC <A HREF="https://www.bbc.co.uk/news/av/world-europe-57144297" >interview</A> broadcast on Tuesday.  "I'd be flattered to hear such an assessment of the work of the Foreign Intelligence service which I run. Such a high evaluation," said the spymaster in remarks translated by the BBC. The SolarWinds supply chain attack saw US and UK government institutions probed by Russian spies, as well as FireEye – itself a major US cybersecurity contractor.  "But I don't have the right to claim the creative achievements of others as my own," continued the SVR chief. As for whodunnit, he was less equivocal. <b>When asked who carried out the SolarWinds attack, Naryshkin had an answer: the US and Britain.  After all, what proof was there that he and his spy agency were to blame?</b> "There is none at least, none that has been made public. Have you seen proof?" he asked his BBC interviewer, who maintained a poker face.  "No, neither have I," said the spymaster. "At the same time we looked into who might be behind all of this."  Naryshkin then read aloud from a typed document, prepared with a noticeably large font size, and claimed that the Snowden revelations "proved" the US and UK were to blame because American spies deliberately weakened a default random number generation algorithm used in RSA products about a decade ago.  Nonetheless, the SVR chief's move is not without precedent. Before the fall of the Berlin Wall, Soviet Russia was well practised in two disciplines of military thought known as dezinformatsiya and maskirovka. Neither term translates well into English but one was about spreading false information among its enemies for political or socially disruptive gains and the other focused on battlefield deception.<HR></BLOCKQUOTE>Far as I can tell, the first public comment from Russia about this... not that the response really surprises.  Take what you will from this.<br><br>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33114629</guid>
<pubDate>Tue, 18 May 2021 19:02:53 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33108575</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.theregister.com/2021/05/11/solarwinds_ceo_orion_build_system/" >www.theregister.com/2021 &middot;&middot;&middot; _system/</A><BLOCKQUOTE><SMALL>quote:</SMALL><HR>CyberUK 21 SolarWinds’ chief exec has described the 18,000 customers who downloaded backdoored versions of its Orion software as a “very small” number while giving a speech to an infosec event.  Sudhakar Ramakrishna, who joined the biz in January, made the comparison while giving the opening keynote at the CyberUK conference, organised by Britain’s National Cyber Security Centre (NCSC). He'll also be giving a talk on the topic at this month's RSA Conference in the US, presumably part of an extended apology tour.  “Although the number of affected customers is very small, that we eventually discovered, it is still a very important thing to discover, because this is a unique and very novel attack on the supply chain of a company,” said Ramakrishna in his opening remarks – adding that “none of our source code control systems were tampered with.”  SolarWinds’ chief exec had been invited to set the tone for the two-day conference, which is being held as a <A HREF="https://www.youtube.com/playlist?list=PLBQXJX7r5ayPWOWAm2ig3zeW93KkZleK2" >series</A> of YouTube lectures this year. <b>The “very small” number of 18,000 affected customers was disclosed in a company filing</b> with the US Stock Exchange Commission, as previously reported.  Of more interest to technically minded readers was the revelation that SolarWinds has rearchitected its build processes, now having “three different environments” running in parallel with their outputs being cross-matched against each other to ensure there are no unexpected differences before being integrated into the final product.<HR></BLOCKQUOTE>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33108575</guid>
<pubDate>Tue, 11 May 2021 16:46:23 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33090617</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.whitehouse.gov/briefing-room/statements-releases/2021/04/19/statement-by-deputy-national-security-advisor-for-cyber-and-emerging-technology-on-solarwinds-and-microsoft-exchange-incidents/" >www.whitehouse.gov/brief &middot;&middot;&middot; cidents/</A><BLOCKQUOTE><SMALL>quote:</SMALL><HR>Due to the vastly increased patching and reduction in victims, we are standing down the current UCG surge efforts and will be handling further responses through standard incident management procedures.  The innovations from the Exchange UCG and the lessons learned from these responses will be used to improve future unified, whole of Government responses to significant cyber incidents, including:<br><br>    Integrating private sector partners at the executive and tactical levels. The active private sector involvement resulted in an expedited Microsoft one-click tool to simplify and accelerate victims’ patching and clean-up efforts, and direct sharing of relevant information. This type of partnership sets precedent for future engagements on significant cyber incidents.<br><br>    CISA created and utilized a methodology to track trends in patching and exposed Exchange servers that enabled the UCG to quantify the scope of the incident.<br><br>    Through industry relationships and leveraging legal authorities, the FBI and DOJ quickly identified the scale of the incidents – <b>in the SolarWinds UCG, for example, scoping from a worst case of 16,800 to fewer than 100 targeted exploited nongovernment entities.</b> This enabled focused victim engagement and improved understanding of what the perpetrators targeted from the larger set of exposed entities.<br><br>    NSA and CISA released cybersecurity advisories that detailed adversary techniques and provided mitigation for system owners. NSA also provided guidance to other U.S. military and intelligence organizations, as well as contractors in the defense industrial base.<HR></BLOCKQUOTE>I seriously have to take those SolarWinds numbers with a rather high sodium intake dose, but if they are true...<br><br>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33090617</guid>
<pubDate>Mon, 19 Apr 2021 20:37:46 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33086737</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://home.treasury.gov/news/press-releases/jy0127" >home.treasury.gov/news/p &middot;&middot;&middot; s/jy0127</A> -- US Treasury formally fingers and sanctions Russian cyberactors for Solarwinds attack<BLOCKQUOTE><SMALL>quote:</SMALL><HR>The Russian Intelligence Services — specifically the Federal Security Service (FSB), Russia’s Main Intelligence Directorate (GRU), and the Foreign Intelligence Service (SVR) — have executed some of the most dangerous and disruptive cyber attacks in recent history, including the SolarWinds cyber attack.  The FSB and GRU were previously sanctioned in 2016, and again in 2018, for malicious cyber activity, and most recently on March 2, 2021 for activities related to the proliferation of weapons of mass destruction (WMD). ... In addition, the Russian Intelligence Services’ third arm, the SVR, is responsible for the 2020 exploit of the SolarWinds Orion platform and other information technology infrastructures.  This intrusion compromised thousands of U.S. government and private sector networks.  The scope and scale of this compromise combined with Russia’s history of carrying out reckless and disruptive cyber operations makes it a national security concern.  The SVR has put at risk the global technology supply chain by allowing malware to be installed on the machines of tens of thousands of SolarWinds’ customers.  Victims of the compromise include the financial sector, critical infrastructure, government networks, and many others.  Further, this incident will cost businesses and consumers in the United States and worldwide millions of dollars to fully address.<HR></BLOCKQUOTE>Originally found out about it from here -- &raquo;<A HREF="https://www.theregister.com/2021/04/15/solarwinds_hack_russia_apt29_positive_technologies_sanctions/" >www.theregister.com/2021 &middot;&middot;&middot; nctions/</A><BLOCKQUOTE><SMALL>quote:</SMALL><HR>Formal attribution of the SolarWind hacks, echoing tentative findings made by Kaspersky Lab, came in a <A HREF="https://home.treasury.gov/news/press-releases/jy0127" >US Treasury Department statement</A> issued this afternoon.  <b>The American attribution was echoed by the British government</b> with Foreign Secretary Dominic Raab saying in a statement: “We see what Russia is doing to undermine our democracies. The UK and US are calling out Russia’s malicious behaviour, to enable our international partners and businesses at home to better defend and prepare themselves against this kind of action.”  The NCSC also said in a public statement that “the overall impact on the UK of the SVR’s exploitation of this software is low.” <b>Government departments have refused to even talk about the impact of the Orion compromise</b> despite it being in widespread use around Whitehall and further afield, <b>lending credibility to the notion that UK.gov was more widely hit by the breach than it wants to admit.</b>  Paul Prudhomme, head of Threat Intelligence Advisory at threat intel biz IntSights told The Register: “The attribution of the SolarWinds supply chain attack campaign to a state-sponsored Russian cyber espionage group is credible, as the high levels of sophistication, tradecraft, and stealth in that campaign were consistent with that of such Russian groups. <b>It nonetheless remains unclear what specific data points enabled the attribution to the Russian APT29 in particular with such a high level of confidence."</b><HR></BLOCKQUOTE><b>EMP mine</b><br><br>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33086737</guid>
<pubDate>Thu, 15 Apr 2021 15:25:22 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33081092</link>
<description><![CDATA[HELLFIRE posted : IISS' Lessons of the SolarWinds hack -- &raquo;<A HREF="https://www.iiss.org/blogs/survival-blog/2021/04/lessons-of-the-solarwinds-hack" >www.iiss.org/blogs/survi &middot;&middot;&middot; nds-hack</A><br><br>Not sure who IISS is, but a very excellent report here, and it does not require signing over of your PII to get a copy.  Most interesting is this observation by the author<BLOCKQUOTE><SMALL>quote:</SMALL><HR>Although the SolarWinds hack has been labelled a cyber ‘attack’, initial analysis indicates that it was intended not to damage, disrupt or destroy networks, but rather to gain intelligence. -- Marcus Willett<HR></BLOCKQUOTE>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33081092</guid>
<pubDate>Fri, 09 Apr 2021 12:03:35 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33080602</link>
<description><![CDATA[tlbepson posted : '-}}<br><br><br>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33080602</guid>
<pubDate>Thu, 08 Apr 2021 17:57:52 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33080494</link>
<description><![CDATA[Shamayim posted : Not at all, mate :D]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33080494</guid>
<pubDate>Thu, 08 Apr 2021 15:58:47 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33080440</link>
<description><![CDATA[tlbepson posted : shamayim...<br><br>LOL!!! Thank you for your hard work!!! <br><br>'-}}<br><br><br>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33080440</guid>
<pubDate>Thu, 08 Apr 2021 15:09:24 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33080209</link>
<description><![CDATA[Shamayim posted : <i>said by tlbepson:<br><br>Are these really real names:<br>"Lord True"<br>»en.wikipedia.org/wiki/Ni ··· ron_True<br>said by tlbepson:<br><br>Are these really real names:<br>"Lord Harris of Haringey"<br>»en.wikipedia.org/wiki/To ··· Haringey</i><br>===<br>On behalf of the forum I tracked them down. Confronted with these comments at afternoon tea, L.True indignantly expostulated “<i>Balderdash, sir!</i>” while L.Harris of Haringey loudly harrumphed “<i>Codswallop!</i>’ - at which point I was shown the door.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33080209</guid>
<pubDate>Thu, 08 Apr 2021 11:39:40 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33072026</link>
<description><![CDATA[DrStrange posted : So hack all their TV feeds and play White Army marches and Navalny speeches.  :)<br><br>(Unless it's the Chinese, in which case hack their TV feeds and replace them with Taiwanese feeds)]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33072026</guid>
<pubDate>Tue, 30 Mar 2021 02:17:33 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33071885</link>
<description><![CDATA[ashrc4 posted : &raquo;<A HREF="https://apnews.com/article/solarwinds-hack-email-top-dhs-officials-8bcd4a4eb3be1f8f98244766bae70395" >apnews.com/article/solar &middot;&middot;&middot; bae70395</A><BLOCKQUOTE><SMALL>quote:</SMALL><HR>“The SolarWinds hack was a victory for our foreign adversaries, and a failure for DHS,” said Sen. Rob Portman of Ohio, top Republican on the Senate’s Homeland Security and Governmental Affairs Committee. “We are talking about DHS’s crown jewels.”<HR></BLOCKQUOTE>Article mentions Einstein not up defending also.<br>Originally sourced from Slashdot.<br><br>P.s. I think we should reconsider hacking back at the nation state lvl and focus on defense...third parties perhaps. Canberra got a partial intrusion the other day here and a major TV network taken off air with the failure of deploying ransomeware.  It is pressumed nation state also. &raquo;<A HREF="https://www.smh.com.au/technology/nine-cyber-attack-has-all-the-hallmarks-of-ransomware-without-the-ransom-20210329-p57eum.html" >www.smh.com.au/technolog &middot;&middot;&middot; eum.html</A>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33071885</guid>
<pubDate>Mon, 29 Mar 2021 21:45:49 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33062165</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.theregister.com/2021/03/17/mimecast_bins_solarwinds_after_compromise/" >www.theregister.com/2021 &middot;&middot;&middot; promise/</A> -- Mimecast bins SolarWinds and compromised servers alike in wake of supply chain hack<BLOCKQUOTE><SMALL>quote:</SMALL><HR>Email security biz Mimecast has dumped SolarWinds' network monitoring tool in favour of Cisco's Netflow product after falling victim to the infamous December supply chain attack.  In an <A HREF="https://www.mimecast.com/incident-report/" >incident report</A> detailing its experiences of the SolarWinds compromise, Mimecast said it had "decommissioned SolarWinds Orion and replaced it with an alternative NetFlow monitoring system".  On top of that, the email security firm also junked a number of "compromised" servers, while admitting that the potentially Russian attackers had "accessed a subset of email addresses and other contact information", "customer server connection information", and "encrypted and/or hashed and salted credentials" as well as viewing source code repositories and Mimecast-issued certificates.  The incident report laid out how much hassle the SolarWinds attackers caused. In addition, the loss of Mimecast as a customer won't have helped SolarWinds' cause. As the first major enterprise to confirm that it has junked SolarWinds in the wake of the supply chain attack, Mimecast could potentially lead the way for others to migrate from the beleaguered infrastructure monitoring 'n' management company.  Among SolarWinds' 18,000 Orion customers were various governments around the world, including the United Kingdom.<HR></BLOCKQUOTE>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33062165</guid>
<pubDate>Wed, 17 Mar 2021 18:42:52 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33053674</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.fireeye.com/blog/threat-research/2021/03/sunshuttle-second-stage-backdoor-targeting-us-based-entity.html" >www.fireeye.com/blog/thr &middot;&middot;&middot; ity.html</A><BLOCKQUOTE><SMALL>quote:</SMALL><HR>Executive Summary<br><br>    In August 2020, a U.S.-based entity uploaded a new backdoor that we have named SUNSHUTTLE to a public malware repository.<br><br>    SUNSHUTTLE is a second-stage backdoor written in GoLang that features some detection evasion capabilities.<br><br>    Mandiant observed SUNSHUTTLE at a victim compromised by UNC2452, and have indications that it is linked to UNC2452, but we have not fully verified this connection.<br><br>    Please see the Technical Annex for relevant MITRE ATT&CK techniques (T1027, T1027.002, T1059.003, T1071.001, T1105, T1140, T1573.001).<br><br>The activity discussed in this blog post is also detailed in a <A HREF="https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/" >Microsoft blog post.</A> We thank the team at Microsoft and other partners for their great collaboration in tracking this actor.<HR></BLOCKQUOTE>&raquo;<A HREF="https://www.technologyreview.com/2021/03/02/1020166/solarwinds-brandon-wales-hack-recovery-18-months/" >www.technologyreview.com &middot;&middot;&middot; -months/</A><BLOCKQUOTE><SMALL>quote:</SMALL><HR>Fully recovering from the SolarWinds hack will take the US government from a year to as long as 18 months, according to the head of the agency that is leading Washington’s recovery.  The hacking campaign against American government agencies and major companies was first discovered in November 2020. At least nine federal agencies were targeted, including the Department of Homeland Security and the State Department. The attackers, who US officials believe to be Russian, exploited a product made by the US software firm SolarWinds in order to hack government and corporate targets.  Brandon Wales, the acting director of CISA, the US Cybersecurity and Infrastructure Agency, says that it will be well into 2022 before officials have fully secured the compromised government networks . Even fully understanding the extent of the damage will take months.<HR></BLOCKQUOTE>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33053674</guid>
<pubDate>Mon, 08 Mar 2021 18:18:08 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33043251</link>
<description><![CDATA[Snowy posted : <div class="bquote"><said>said by <a href="/profile/765230" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=765230');">Uncle Paul</a>:</said><p>I'd love to know which merchant got breached.<br></p></div>IMO, we <i>should</i> have a right to know which merchant was breached.<br>Lobbyist are the only reason we don't have that right.<br><br>Some of the benefits of having mandatory disclosure at the federal level.<br><br>1. Despite lobbyist arguments to the contrary - merchants WILL handle PII more carefully than they currently do.<br>They will invest more in IT security - it will prove cheaper in the long run.<br><br>2. It will re-define the reasons why we shop at a certain merchant in a positive way.<br>Instead of only considering things such as cost, service or product quality it will add another measure -<i> "How often are they breached"</i> into the mix.<br><br>3. It will correctly lay blame on the guilty merchant.<br>Instead of guessing which merchant gave up our PII we would know with absolute certainty who gave it up.<br>That scares the heck out of merchants - especially those that believe adequate IT security is too expensive.<br>Those that are relying on a risk assessment that says the cost of a breach should be itemized as a cost of doing business would quickly change algorithms to reflect the new reality of accountability.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33043251</guid>
<pubDate>Wed, 24 Feb 2021 16:56:13 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33043195</link>
<description><![CDATA[Uncle Paul posted : Every time I have to notify all my auto billed credit card companies because of a card change... I'd love to know which merchant got breached.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33043195</guid>
<pubDate>Wed, 24 Feb 2021 16:08:52 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33043135</link>
<description><![CDATA[Snowy posted : Strengthening/Expanding current laws regarding breach notification that included customer PII is long overdue.<br>It's very doable as a breach that includes health records have a mandatory disclosure policy via the HIPAA Breach Notification Rule.<br>&raquo;<A HREF="https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html" >www.hhs.gov/hipaa/for-pr &middot;&middot;&middot; dex.html</A><br><br>ALL PII should have legal public disclosure requirements in the event of a breach.<br><br>A breach of a business that didn't include PII - just there own data - I'm less sure about and likely wouldn't agree with one being put in place with the exception of publicly traded companies.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33043135</guid>
<pubDate>Wed, 24 Feb 2021 15:31:54 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33042881</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.theregister.com/2021/02/24/microsoft_solarwinds_congress/" >www.theregister.com/2021 &middot;&middot;&middot; ongress/</A> -- Microsoft president asks Congress to force private-sector orgs to publicly admit when they've been hacked<BLOCKQUOTE><SMALL>quote:</SMALL><HR>The private sector should be legally obliged to disclose any major hacks of their systems, says Microsoft’s president and top lawyer Brad Smith.  Speaking at a Senate Intelligence Committee <A HREF="https://www.intelligence.senate.gov/hearings/open-hearing-hearing-hack-us-networks-foreign-adversary" >hearing</A> on Tuesday regarding the SolarWinds backdoor, through which suspected Russian agents infiltrated the computers of US government departments and Fortune 500 companies, Smith argued it was “time not only to talk about but to find a way to take action to impose in an appropriate manner some kind of notification obligation on entities in the private sector.”  He noted it was “not a typical step” for a company to ask the United States Congress to “place a new law on ourselves and on our customers, but I think it’s the only way we’re going to protect our country and I think it’s the only way we’re going to protect the world.”  The invitation was certainly unusual but it was notably not challenged by the other panelists at the hearing: the CEO of SolarWinds, and of security experts FireEye – which first spotted and blew the lid off the tampered-with network monitoring software – and CrowdStrike. All of them agreed that there needed to be more information sharing across business and government, although only Smith proposed an actual legal obligation.  The experts were also agreed on a number of other aspects of the hack: that it was carried out by a “very, very sophisticated” team that was undoubtedly state-sponsored. CrowdStrike’s CEO George Kurtz noted the hackers’ “superb tradecraft,” and “very unique” approach. And while only Smith was willing to say categorically that it was Russia, FireEye’s CEO Kevin Mandia noted that following an intensive investigation by his team, which included looking for clues in reams of decompiled code, they had concluded that the hack was “not consistent with China, North Korea or Iran, and was most consistent with Russia.”  All of this inevitably led to a discussion about what to do to prevent such future invasions. Everyone agreed that sharing information was essential, and that too much information was currently being held in “silos,” either in government or the private sector. There’s nothing new in this, or in calls for everybody to share more intelligence.  But the reason why businesses don’t like that idea was apparent in the form of SolarWinds’ Ramakrishna who read from a script and offered only bland generalizations, almost certainly because his company faces potential ruin from lawsuits heading his way and the lawyers locked down anything he would say in a public hearing.  That’s why Smith suggested a compulsory disclosure law.<HR></BLOCKQUOTE>&raquo;<A HREF="https://www.intelligence.senate.gov/hearings/open-hearing-hearing-hack-us-networks-foreign-adversary" >www.intelligence.senate. &middot;&middot;&middot; dversary</A> -- Senate hearing here, along with respective opening statements<br><br>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33042881</guid>
<pubDate>Wed, 24 Feb 2021 11:59:38 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33038660</link>
<description><![CDATA[Uncle Paul posted : <div class="bquote"><said>said by <a href="/profile/1691829" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=1691829');">HELLFIRE</a>:</said><p>&raquo;<A HREF="https://msrc-blog.microsoft.com/2021/02/18/microsoft-internal-solorigate-investigation-final-update/" >msrc-blog.microsoft.com/ &middot;&middot;&middot; -update/</A> -- Microsoft posts final update to Solorigate investigation<BLOCKQUOTE><SMALL>quote:</SMALL><HR>We have confirmed that the repositories complied and did not contain any <b>live, production credentials.</b><HR></BLOCKQUOTE>Regards<br></p></div>Why does this seem carefully worded?]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33038660</guid>
<pubDate>Fri, 19 Feb 2021 17:42:21 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33037961</link>
<description><![CDATA[banner posted : Hopefully they didn't get what they needed.<br><div class="bquote"><p>For a small number of repositories, there was additional access, including in some cases, downloading component source code. These repositories contained code for:<br><br>a small subset of Azure components (subsets of service, security, identity)<br></p></div>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33037961</guid>
<pubDate>Fri, 19 Feb 2021 01:46:12 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33037850</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://msrc-blog.microsoft.com/2021/02/18/microsoft-internal-solorigate-investigation-final-update/" >msrc-blog.microsoft.com/ &middot;&middot;&middot; -update/</A> -- Microsoft posts final update to Solorigate investigation<BLOCKQUOTE><SMALL>quote:</SMALL><HR>There was no case where all repositories related to any single product or service was accessed. There was no access to the vast majority of source code. For nearly all of code repositories accessed, only a few individual files were viewed as a result of a repository search.<br><br>For a small number of repositories, there was additional access, including in some cases, downloading component source code. These repositories contained code for:<br><br>    a small subset of Azure components (subsets of service, security, identity)<br>    a small subset of Intune components<br>    a small subset of Exchange components<br><br>The search terms used by the actor indicate the expected focus on attempting to find secrets. Our development policy prohibits secrets in code and we run automated tools to verify compliance. Because of the detected activity, we immediately initiated a verification process for current and historical branches of the repositories. We have confirmed that the repositories complied and did not contain any live, production credentials.<HR></BLOCKQUOTE>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33037850</guid>
<pubDate>Thu, 18 Feb 2021 21:44:23 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33036860</link>
<description><![CDATA[ashrc4 posted : Call me ignorant of how  Solarwinds Orion works but "date modified" on dll's etcetera should have a repository function or report that is subject to human verification and automated. Including their own in-house signing of dll's etc. A update shouldn't be able to be pushed with protocols for verification.<br>Date created and modified should for Orion should be actively monitored also.<br>Even if you could bypass this new system you can follow the breadcrumbs for any subsequent modifications either primary or secondary etc. I.e. what ever gets modified on clientside can be traced immediately.<br>Thoughts pls.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33036860</guid>
<pubDate>Wed, 17 Feb 2021 23:13:13 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33035562</link>
<description><![CDATA[ashrc4 posted : <div class="bquote"><said>said by <a href="/profile/1691829" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=1691829');">HELLFIRE</a>:</said><p><div class="bquote"><said>said by <a href="/profile/1618925" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=1618925');">ashrc4</a>:</said><p>What hasn't been infiltrated :huh:<br></p></div>Far as I know, the human brain... but I'm sure some "Won't SOMEone think of the [insert here] !"-type is screaming for it A-SAP! [/cynical]<br><br>Regards<br></p></div>Nah they have been sometime now and well past this video.<br>&raquo;<A HREF="https://www.facebook.com/watch/?v=246793862557789" >www.facebook.com/watch/? &middot;&middot;&middot; 62557789</A><br><br>I wonder if OZ  had a persistent insider.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33035562</guid>
<pubDate>Tue, 16 Feb 2021 21:22:37 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33035341</link>
<description><![CDATA[HELLFIRE posted : <div class="bquote"><said>said by <a href="/profile/1618925" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=1618925');">ashrc4</a>:</said><p>What hasn't been infiltrated :huh:<br></p></div>Far as I know, the human brain... but I'm sure some "Won't SOMEone think of the [insert here] !"-type is screaming for it A-SAP! [/cynical]<br><br>And FWIW, TheReg's writeup on that topic you linked to ashrc4 <A HREF="/useremail/u/1618925"><i class='fa fa-user'></i></A> gives alittle more technical details how the pwnage happened -- &raquo;<A HREF="https://www.theregister.com/2021/02/16/centreon_sandworm_attack/" >www.theregister.com/2021 &middot;&middot;&middot; _attack/</A><BLOCKQUOTE><SMALL>quote:</SMALL><HR>ANSSI on Monday <A HREF="https://www.cert.ssi.gouv.fr/cti/CERTFR-2021-CTI-004/" >revealed</A> it is aware of two backdoors in Centreon the software, and said several French IT services providers have been infiltrated for up to three years.  In a detailed <A HREF="http://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-004.pdf" >report</A> [PDF] that The Register navigated with rusty high school French and online translation services, ANSSI said the attack used the PAS web shell and the Exaramel backdoor trojan.  <b>Neither backdoor is new. The PAS web shell has been on security vendors’ radars since 2017 and mentions of Exaramel can be found in 2018.</b> PAS does nasty things including brute force attacks on databases, to gain access to their contents. Exaramel is a remote-control tool.  <b>ANSSI said the attack was possible because some Centreon users didn’t keep their systems patched.</b> The agency did not describe the consequences of the attack but said the combination of the two backdoors allowed complete compromise of Centreon, the software, and therefore lateral movement across networks.  As the attack targeted service providers, and such organisations are likely to offer multi-tenanted infrastructure, it’s possible many entities have been compromised.<HR></BLOCKQUOTE><b>EMP mine</b><br><br>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33035341</guid>
<pubDate>Tue, 16 Feb 2021 17:12:25 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034802</link>
<description><![CDATA[Astyanax posted : <div class="bquote"><said>said by <a href="/profile/1785166" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=1785166');">mmmdonuts</a>:</said><p>I have to say that if the project team was that large then I'm impressed.<br></p></div>It's probably just 1 400-lb Russian kid in his mom's basement.  :)]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034802</guid>
<pubDate>Tue, 16 Feb 2021 07:06:04 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034772</link>
<description><![CDATA[ashrc4 posted : &raquo;<A HREF="https://venturebeat.com/2021/02/15/hackers-targeted-it-monitoring-company-centreon-to-breach-organizations-over-3-year-period/" >venturebeat.com/2021/02/ &middot;&middot;&middot; -period/</A><BLOCKQUOTE><SMALL>quote:</SMALL><HR>(Reuters) — Hackers have spent up to three years breaking into organizations by targeting monitoring software made by the French company Centreon, France’s cybersecurity watchdog said on Monday.<br><br>The watchdog, known by its French acronym ANSSI, stopped short of identifying the hackers but said they had a similar modus operandi as the Russian cyberespionage group often nicknamed “Sandworm.”<br><br>ANSSI, Centreon, and the Russian embassy in Paris did not immediately return messages seeking comment.<br><br>The targeting of Centreon, a Paris-based company which specializes in information technology monitoring, further highlights how attractive such firms are to digital spies.<br><br>U.S. cybersecurity officials are still trying to get their hands around an ambitious espionage campaign that hijacked IT monitoring software made by the Austin, Texas-based firm SolarWinds. American officials, who have blamed Moscow for the hacking, have hinted that other firms have also been hit in similar ways.<br><br>Earlier this month Reuters reported that suspected Chinese hackers also targeted SolarWinds customers, using a different and less serious bug to help spread it across their victims’ networks.<br><br>The initial vector for the campaign of intrusions that targeted Centreon software was not known, ANSSI said in a 40-page report posted on its website. It said it had discovered intrusions dating back to late 2017 and stretching into 2020.<br><br>The watchdog did not identify the names or number of victims involved but said they were mainly IT services firms such as internet hosting providers.<br><br>Centreon’s website says it has more than 600 enterprise clients across the world, including the French Ministry of Justice<HR></BLOCKQUOTE>What hasn't been infiltrated :huh:]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034772</guid>
<pubDate>Tue, 16 Feb 2021 03:20:03 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034703</link>
<description><![CDATA[tlbepson posted : leibold:<br><i>>>There were definitely times when I looked at a particular piece of code and recognized that it was typical for the style of a particular programmer.</i><br><br>Yes...that's my experience too as I did a lot of maintenance and patch coding along with writing new stuff.<br><br><br><i>>>I tend to match the style of those who came before me (instead of trying to push my mark onto it).</i><br><br>Yes--again...'-}}<br><br>A style can be (not always) an approach to the logic of the code from a particular perspective and, if you come along later and try and change the perspective, you can really screw up the code and make more work for youself...<br><br><br>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034703</guid>
<pubDate>Mon, 15 Feb 2021 23:16:39 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034556</link>
<description><![CDATA[leibold posted : <div class="bquote"><said>said by <a href="/profile/581813" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=581813');">tlbepson</a>:</said><p>I'd like to know what criteria they used to determine 1,000 programmers were involved.<br></p></div>I know where they are coming from. Much of my early carrier in software engineering was spend maintaining and fixing bugs in code that other people wrote. There were definitely times when I looked at a particular piece of code and recognized that it was typical for the style of a particular programmer.<br><br>However I wonder whether they'd be successful tracking my style when looking at code I had worked on (unless it was entirely new code I had created). When making changes to existing code, I tend to match the style of those who came before me (instead of trying to push my mark onto it).<br><br>Determining style from compiled code is much less reliable (I wouldn't go so far as to claim that it is completely impossible), especially in the presence of strong code optimizers.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034556</guid>
<pubDate>Mon, 15 Feb 2021 19:57:49 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034497</link>
<description><![CDATA[HELLFIRE posted : Watched the whole 60Minute segment, it's good on its surface to give a digestable intro / status summary of things, and I thought the interviewees selected <br>were very good to give a "I'm not [insert here] , I just want the fscking thing to work!" intro into why this is so important -- Brad Smith (Microsoft), Kevin <br>Mandia (Fire Eye), Chris Inglis (ex-NSA cyberwarrior), and Jon Miller (started off as a hacker and now runs a company called Boldend, designs and sells <br>cutting-edge cyber weapons to U.S. intelligence agencies).<br><br>I know we're by no means at the last chapter of this fiasco, and can only see where things go from here...<br><br>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034497</guid>
<pubDate>Mon, 15 Feb 2021 18:23:11 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034465</link>
<description><![CDATA[cramer posted : Well, it is Microsoft making that determination. Having worked in software for decades, it is absolutely impossible to <i>guess</i> how many hands have been on the code by looking at the compiled output. It's still non-trivial when you have access to the SCM. (the person who committed it, isn't always the one who wrote it. There are hundreds of lines of code I wrote that don't have my name next to them.) There are plenty of complex things created by teams of one.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034465</guid>
<pubDate>Mon, 15 Feb 2021 17:45:34 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034456</link>
<description><![CDATA[tlbepson posted : I'd like to know what criteria they used to determine 1,000 programmers were involved...I find it more than a bit...well neither "suspicious" nor "unbelievable" are quite the terms...perhaps "unlikely" might be better...<br><br><br>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034456</guid>
<pubDate>Mon, 15 Feb 2021 17:34:55 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034296</link>
<description><![CDATA[Uncle Paul posted : <div class="bquote"><said>said by <a href="/profile/1691829" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=1691829');">HELLFIRE</a>:</said><p><BLOCKQUOTE><SMALL>quote:</SMALL><HR> Most US cyber defences look at activity beyond the nation’s borders and assume the private sector in the USA takes care of itself.<HR></BLOCKQUOTE></p></div>Who assumes the private sector in the USA takes care itself?]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034296</guid>
<pubDate>Mon, 15 Feb 2021 14:44:25 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034205</link>
<description><![CDATA[leibold posted : <div class="bquote"><p>If anyone understands the havoc 1,000 developers can create, it’s Microsoft. <br></p></div>I burst out laughing when I read this. So true! :-)]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034205</guid>
<pubDate>Mon, 15 Feb 2021 13:23:33 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034162</link>
<description><![CDATA[mmmdonuts posted : I have to say that if the project team was that large then I'm impressed.<br><br>Even though this was used for nefarious reasons of the worst kind in the scope of IT/tech, whoever was program manager/project manager for this is good...really good. Then you have the architects, designers, coders, testers, etc. <br><br>This was quite the project with some real talent involved. ]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034162</guid>
<pubDate>Mon, 15 Feb 2021 12:49:24 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034146</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.theregister.com/2021/02/15/solarwinds_microsoft_fireeye_analysis/" >www.theregister.com/2021 &middot;&middot;&middot; nalysis/</A> -- Microsoft says it found 1,000-plus developers' fingerprints on the SolarWinds attack<br>&raquo;<A HREF="https://www.cbsnews.com/news/solarwinds-hack-russia-cyberattack-60-minutes-2021-02-14/" >www.cbsnews.com/news/sol &middot;&middot;&middot; 1-02-14/</A><BLOCKQUOTE><SMALL>quote:</SMALL><HR>Microsoft president Brad Smith said the software giant’s analysis of the SolarWinds hack suggests the code behind the crack was the work of a thousand or more developers.  Speaking on US news magazine program 60 Minutes, Smith labelled the attack “the largest and most sophisticated attack the world has ever seen.”  If anyone understands the havoc 1,000 developers can create, it’s Microsoft.  Smith didn’t say who those 1,000 developers worked for, but compared the SolarWinds hack to attacks on Ukraine that had been widely attributed to Russia (which denies involvement).  The 60 Minutes segment also featured FireEye CEO Kevin Mandia. FireEye also fell foul of the SolarWinds attack and Mandia revealed how his firm spotted the attack when an attempt at two-factor authentication raised suspicion.  60 Minutes also dropped a little nugget of insight by revealing that 4,032 lines of code were at the core of the crack.  Others featured in the <A HREF="https://www.cbsnews.com/news/solarwinds-hack-russia-cyberattack-60-minutes-2021-02-14/" >segment</A> opined that it exploited a blind spot in US defences by running on servers hosted in America itself. Most US cyber defences look at activity beyond the nation’s borders and assume the private sector in the USA takes care of itself.<HR></BLOCKQUOTE>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33034146</guid>
<pubDate>Mon, 15 Feb 2021 12:32:57 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33027040</link>
<description><![CDATA[Snowy posted : <div class="bquote"><said>said by <a href="/profile/1691829" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=1691829');">HELLFIRE</a>:</said><p><BLOCKQUOTE><SMALL>quote:</SMALL><HR>Our investigation has now confirmed that this incident is related to the SolarWinds Orion software compromise and was perpetrated by the same sophisticated threat actor.<br><HR></BLOCKQUOTE></p></div><BLOCKQUOTE><SMALL>quote:</SMALL><HR><b><i>US government formally blames Russia for SolarWinds hack</b></i><br><br><b>Joint statement from the FBI, CISA, ODNI, and NSA says SolarWinds hack was "likely Russian in origin."</b><br><HR></BLOCKQUOTE>&raquo;<A HREF="https://www.zdnet.com/article/us-government-formally-blames-russia-for-solarwinds-hack/" >www.zdnet.com/article/us &middot;&middot;&middot; ds-hack/</A><br><br>I've not seen any behind the scenes forensic data on the SolarWind hack but I'm not so arrogant to ignore the collective expertise of the FBI, CISA, ODNI, and NSA.<br><br>Their statement of blame on Russia is being directly challenged by our former president who claims Russia's involvement is fake news - that China is the true culprit.<br><br>Out of that has sprung disinformation campaigns placing blame on China - don't fall victim to this baseless myth - support a fun myth, a harmless myth, one that has the potential for a good laugh at the end of the day.<br><br> ]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33027040</guid>
<pubDate>Mon, 08 Feb 2021 05:41:18 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33027006</link>
<description><![CDATA[HELLFIRE posted : &raquo;<A HREF="https://www.mimecast.com/blog/important-security-update/" >www.mimecast.com/blog/im &middot;&middot;&middot; -update/</A> -- Mimecast suffers doublewhammy of SolarWinds attack and certificate purloin<BLOCKQUOTE><SMALL>quote:</SMALL><HR>As we previously shared, when Microsoft informed us about the compromise of a Mimecast-issued certificate used to authenticate a subset of Mimecast’s products, we advised affected customers to break and re-establish their connections with newly issued keys. The vast majority of these customers have taken this action, and Microsoft has now disabled use of the former connection keys for all affected Mimecast customers.  We also launched an internal investigation, supported by leading third-party forensics experts, and we are coordinating our activities with law enforcement. Our investigation has now confirmed that this incident is related to the SolarWinds Orion software compromise and was perpetrated by the same sophisticated threat actor.  Our investigation also showed that the threat actor accessed, and potentially exfiltrated, certain encrypted service account credentials created by customers hosted in the United States and the United Kingdom. These credentials establish connections from Mimecast tenants to on-premise and cloud services, which include LDAP, Azure Active Directory, Exchange Web Services, POP3 journaling, and SMTP-authenticated delivery routes.  <b>Although we are not aware that any of the encrypted credentials have been decrypted or misused, we are advising customers hosted in the United States and United Kingdom to take precautionary steps to reset their credentials. </b><HR></BLOCKQUOTE><b>Original EMP from source article.</b><br><br>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33027006</guid>
<pubDate>Mon, 08 Feb 2021 00:39:45 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33023190</link>
<description><![CDATA[HELLFIRE posted : Solarwinds not out of the (security) woods yet...<br><br>&raquo;<A HREF="https://www.theregister.com/2021/02/03/solarwinds_patch_trustwave/" >www.theregister.com/2021 &middot;&middot;&middot; ustwave/</A><br>&raquo;<A HREF="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/" >www.trustwave.com/en-us/ &middot;&middot;&middot; ilities/</A><BLOCKQUOTE><SMALL>quote:</SMALL><HR>As if that supply chain attack wasn't bad enough, SolarWinds has had to patch its Orion software again after eagle-eyed researchers discovered fresh vulnerabilities – including one that can be exploited to achieve remote code execution.  Ziv Mador, security research veep at Trustwave, the firm that found the flaws, told The Register: "It's very severe, not only because of the ability to run unauthorized code on the Orion platform, but also because anyone on the network, not even someone that has [no] access to that server, can do that."  Detailed in a <A HREF="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/full-system-control-with-new-solarwinds-orion-based-and-serv-u-ftp-vulnerabilities/" >blog post today,</A> Trustwave discovered that SolarWinds' Orion network management product contained a remote code execution (RCE) flaw (CVE-2021-25274) that hinged on SolarWinds' use of the Microsoft Message Queue technology.  The vulns are not known to have been abused by miscreants who used Orion to infiltrate FireEye and the US government, among others, last year.<HR></BLOCKQUOTE>It's been painful, but I will give credit due that for the most part, this hasn't been a Equifax / Ashley Madison / Mary Ann Davidson-esque response to security.<br><br>Regards]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33023190</guid>
<pubDate>Wed, 03 Feb 2021 19:07:45 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33022791</link>
<description><![CDATA[DrStrange posted : One of my old boat-anchor receivers has an HF amp tube which says 'made in USSR'.  I think if you dig down deep enough, there is amplification of our home-grown nutball tinfoil-hat stuff which has a similar provenance.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33022791</guid>
<pubDate>Wed, 03 Feb 2021 13:09:50 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33022771</link>
<description><![CDATA[Snowy posted : It's not Russian based disinformation that is the greatest danger.<br>It's the homegrown, the local type of disinformation campaigns that present the greatest danger of being accepted as fact as obviously some in the US are already attempting to divert attention away from Russia and towards China which I strongly disagree with.<br><br>Absolutely!]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33022771</guid>
<pubDate>Wed, 03 Feb 2021 12:54:53 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33022760</link>
<description><![CDATA[DrStrange posted : Долой российскую дезинформацию!<br><br>And while you're at it, free Navalny!<br><br>:D]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33022760</guid>
<pubDate>Wed, 03 Feb 2021 12:46:47 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33022703</link>
<description><![CDATA[Snowy posted : Here's what reuters had to say about a suspected China hack.<BLOCKQUOTE><SMALL>quote:</SMALL><HR>The software flaw exploited by the suspected Chinese group is separate from the one the United States has accused Russian government operatives of using to compromise up to 18,000 SolarWinds customers, including sensitive federal agencies, by hijacking the company’s Orion network monitoring software.<br><HR></BLOCKQUOTE>&raquo;<A HREF="https://www.reuters.com/article/cyber-solarwinds-china-idUSL1N2K22ZA" >www.reuters.com/article/ &middot;&middot;&middot; 1N2K22ZA</A><br><br>This second attack is not to be confused with or <i><b>purposefully manipulated</i></b> to take any pressure off of Russia for it's massive attack against the US as here is the scope of the second attack according to SolarWinds<BLOCKQUOTE><SMALL>quote:</SMALL><HR>SolarWinds said it was aware of a single customer that was compromised by the second set of hackers but that it had “not found anything conclusive” to show who was responsible.<br><HR></BLOCKQUOTE>Short story: This is not a political issue - It's a matter of national security -<br>Don't fall for any <b>disinformation campaigns</b> that try to divert attention away from the true culprits of the massive SolarWinds hack.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33022703</guid>
<pubDate>Wed, 03 Feb 2021 11:52:23 EDT</pubDate>
</item>
<item>
<title>Re: Solarwinds &#x26;quot;Orion&#x26;quot; may be compromised,linked to FireEye?</title>
<link>http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33022404</link>
<description><![CDATA[ashrc4 posted : Reuters is running a story on China using solarwinds to spy on us payroll...site is down at present.<br>With the China made laptops shipping with Russian phoning home spyware it's hard to say their wasn't collaboration or doubling up involved either.<br>Edit added link<br>&raquo;<A HREF="https://www.google.com/amp/s/www.hindustantimes.com/world-news/suspected-china-hackers-used-solarwinds-bug-to-spy-on-us-payroll-agency-report-101612310857146-amp.html" >www.google.com/amp/s/www &middot;&middot;&middot; amp.html</A>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Solarwinds-quotOrionquot-may-be-compromisedlinked-to-FireEye-33022404</guid>
<pubDate>Wed, 03 Feb 2021 06:23:44 EDT</pubDate>
</item>
</channel>
</rss>
