Analysts Uncover More Servers Used in SolarWinds Attack Twitter Get Permission
Researchers at the security firm RiskIQ say they ve discovered more than a dozen previously undocumented command-and-control servers used in the SolarWinds supply chain attack, showing that the cyberespionage operation was much larger than previously identified.
U.S. investigators say the Russian Foreign Intelligence Service, aka SVR, was responsible for the attack.
Many of these command-and-controls servers were hosted within the U.S. by cloud infrastructure service providers, including Amazon Web Services, to help the attackers avoid detection and blend with normal network traffic, RiskIQ says in a new report.