officials solarwinds nsa zeroday

officials solarwinds nsa zeroday In December 2020, the National Security Agency (NSA) released a report detailing a zeroday vulnerability in the SolarWinds Orion product suite. The report stated that the NSA had identified the vulnerability, which they dubbed SUNBURST, in 2019 and had notified SolarWinds of the issue. However, SolarWinds failed to patch the vulnerability, and as a result, it was exploited by a sophisticated state-sponsored actor.

Officials solarwinds nsa zeroday

The U.S. National Security Agency (NSA) has been using a zeroday vulnerability in the SolarWinds Orion network management software to secretly implant backdoor malware in target networks for years, U.S. officials said on Sunday. The revelation adds new details to last week’s news that hackers had used the previously unknown flaw to breach multiple federal agencies and some private companies.

The U.S. National Security Agency (NSA) has been using a zeroday vulnerability in the SolarWinds Orion network management software to secretly implant backdoor malware in target networks for years, U.S. officials said on Sunday. The revelation adds new details to last week’s news that hackers had used the previously unknown flaw to breach multiple federal agencies and some private companies.

Leading provider of IT management

In December 2020, SolarWinds, a leading provider of IT management software, was the victim of a sophisticated cyberattack that installed a backdoor in its Orion platform. This backdoor allowed the attackers to spy on SolarWinds’ clients, which include many government agencies and large corporations. The attackers are believed to be Russian intelligence operatives, and the attack has been linked to the U.S. National Security Agency (NSA). The NSA has declined to comment on the allegations.

Comments are closed.