SolarWinds releases known attack timeline but new data suggests hackers may have done a dummy run last year

SolarWinds releases known attack timeline but new data suggests hackers may have done a dummy run last year

In brief In an 8-K filing to the US Securities and Exchange Commission, SolarWinds has given more details on exactly how it learned its servers were spewing out malware.


The notice [PDF] says that FireEye notified the network management biz's CEO (who had only been on the job for three days) of a serious security issue on 12 December. But by then the SUNBURST malware had already spread to around 18,000 customers.


"The vulnerability has only been identified in updates to the Orion Platform products delivered between March and June 2020, but our investigations are still ongoing," the filing said.


"Also, while ..

Support the originator by clicking the read the rest link below.