FireEye stumbled upon SolarWinds default while trying the hack itself

Sberbank PSJC unveils Russia's fastest supercomputer

Photographer: Andrey Rudakov / Bloomberg

When FireEye Inc. discovered to have been hacked this month, cybersecurity firm investigators immediately began trying to figure out how the attackers outperformed their defenses.

Not only was FireEye attacked, they found out quickly. The researchers discovered profitability in a product manufactured by one of its software vendors, Texas-based SolarWinds Corp.

“We examined 50,000 lines of source code, which we were able to determine was a back door to SolarWinds,” said Charles Carmakal, senior vice president and technical director of Mandiant, the FireEye incident response arm.

After discovering the back door, FireEye contacted SolarWinds and law enforcement, Carmakal said.

The hackers, suspected of being part of an elite Russian group, took advantage of the vulnerability to deploy malware, which then made its way into SolarWinds customers’ systems when they updated their software. So far, more than 25 entities have been victims of the attack, according to people familiar with the investigations. But SolarWinds says as many as 18,000 entities may have downloaded the malicious Trojan.

The attackers targeted and committed “high-value targets, both governmental and commercial,” Carmakal said.

.Source

Leave a Comment