Total Tests:

SolarWinds attack damage will be 'far worse than we think'

By Kirsten Doyle for ITWeb
Tuesday, December 15, 2020

FireEye has already updated its products to detect all known altered SolarWinds binaries, and is scanning for any traces of activity by this actor and reaching out to both customers and non-customers if it sees potential indicators.

Quick and inexpensive access

Ekaterina Khrustaleva, COO of ImmuniWeb, says supply chain attacks have surged this year, as these attacks offer rapid and inexpensive access to valuable data held by high-profile targets.

“The victims, like what has happened in the SolarWinds case, usually have no technical means to detect intrusion in a timely manner unless the breached supplier informs them,” she says.

Many third-party suppliers simply don’t have the budgets for the same level of incident detection and response as their enterprise clients. Hackers and nation-state threat actors deliberately target the weakest link to get rapid results and remain undetected.

Attribution of sophisticated APT attacks, such as this one remain a highly complicated, time-consuming and costly task, she says. “Global cooperation in cyber crime prosecution is vital to break the impasse and make computer crime investigable.” Read Full Article


Book a Call Ask a Question
Close
Talk to ImmuniWeb Experts
ImmuniWeb AI Platform
Have a technical question?

Our security experts will answer within
one business day. No obligations.

Have a sales question?
Email:
Tel: +41 22 560 6800 (Switzerland)
Tel: +1 720 605 9147 (USA)
*
*
*
Your data will stay private and confidential