comparemela.com


01/19/2021
Security solutions company Malwarebytes affirmed on Monday that alternative methods besides tainted SolarWinds Orion software were used in the recent "Solorigate" advanced persistent threat (APT) attacks.
Malwarebytes has inside knowledge to that effect because it, too, was a victim of this APT group, which is alleged to be a nation-state actor, with Russia having been named. Malwarebytes doesn't use the SolarWinds Orion management software, which got corrupted by a so-called "supply-chain" attack method of inserting code at the build stage, which is referred to as "Sunburst" or "Solorigate."
Instead, Malwarebytes was first notified it had a possible issue when it was contacted by the Microsoft Security Response Center about the suspicious activity of an application used with the Microsoft 365 service.

Related Keywords

Russia ,Marcin Kleczynski ,Kurt Mackie ,Solarwinds Orion ,Microsoft Security Response Center ,Microsoft Office ,Infrastructure Security Agency ,Microsoft Security Response Center On ,No Malwarebytes Software Compromise ,Microsoft ,Methods Used Besides ,Microsoft Security ,Response Center ,Dirk Jan Mollema ,Azure Active ,Application Administrator ,Sync Account ,Malwarebytes ,Solar Winds ,Solorigate ,Security ,Attack ,ரஷ்யா ,கர்ட் மேக்கி ,மைக்ரோசாஃப்ட் பாதுகாப்பு பதில் மையம் ,மைக்ரோசாஃப்ட் அலுவலகம் ,மைக்ரோசாஃப்ட் பாதுகாப்பு பதில் மையம் ஆன் ,மைக்ரோசாஃப்ட் ,முறைகள் பயன்படுத்தப்பட்டது தவிர ,மைக்ரோசாஃப்ட் பாதுகாப்பு ,பதில் மையம் ,நீலமான செயலில் ,ஒத்திசைவு எண்ணுதல் ,சூரிய காற்று ,பாதுகாப்பு ,தாக்குதல் ,

© 2025 Vimarsana

comparemela.com © 2020. All Rights Reserved.