Microsoft Exchange server hack: why the cyberattack matters businessinsider.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from businessinsider.com Daily Mail and Mail on Sunday newspapers.
9 March 2021, 10:00 pm EST By Microsoft Email Hack Could be Bigger than Thought of as Estimations Dictate Tens of Thousands ( Screenshot From Pxhere Official Website )
Just a week after Microsoft had initially announced that its very own widely used email server program has reportedly been hacked. Experts are also reportedly not encouraged by what they have been able to find.
Red Canary cybersecurity firm comments
According to the story by NBC News, Katie Nickels, the acting director of intelligence at a certain cybersecurity firm known as Red Canary noted that in short, it has just gotten really messy. It was noted that they were actually seeing no signs of everything slowing down.
Get Permission
Researchers with Microsoft and FireEye are disclosing additional malware used by the hacking group that targeted SolarWinds in December 2020, according to a pair of reports released Thursday.
The newly discovered malware appears to be second-stage payloads deployed by the hacking group after victimized organizations downloaded a Trojanized software update to SolarWind s Orion network monitoring platform, which contained a backdoor dubbed Sunburst, the reports note. While about 18,000 of the company s customers downloaded the compromised software update, the attackers only deployed additional malware against certain organizations.
Both Microsoft and FireEye found these newly discovered second-stage malware variants were likely deployed in the later stages of the supply chain attack, most likely around August or September 2020. The attackers appear to have first compromised the SolarWinds network in September 2019 and then inserted the Sunburst backdoor in the soft
Get Permission
Researchers with Microsoft and FireEye are disclosing additional malware used by the hacking group that targeted SolarWinds in December 2020, according to a pair of reports released Thursday.
The newly discovered malware appears to be second-stage payloads deployed by the hacking group after victimized organizations downloaded a Trojanized software update to SolarWind s Orion network monitoring platform, which contained a backdoor dubbed Sunburst, the reports note. While about 18,000 of the company s customers downloaded the compromised software update, the attackers only deployed additional malware against certain organizations.
Both Microsoft and FireEye found these newly discovered second-stage malware variants were likely deployed in the later stages of the supply chain attack, most likely around August or September 2020. The attackers appear to have first compromised the SolarWinds network in September 2019 and then inserted the Sunburst backdoor in the soft
Researchers Disclose More Malware Used in SolarWinds Attack govinfosecurity.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from govinfosecurity.com Daily Mail and Mail on Sunday newspapers.