SolarWinds began notifying its customers about the breach in mid-December 2020. “That explains what they were able to do in September-October of 2019.” ![]() “They were doing very early reconnaissance activities in January 2019,” he said. SolarWinds assessed hundreds of terabytes of data and thousands of virtual build systems across its environment, Ramakrishna said. And in this case, given the amount of time they spent and given the delicateness that they had in their efforts, they were able to cover their fingerprints and their tracks every step of the way.” Early Reconnaissance ![]() “When you go through an investigation, you have a checklist, a set of hypotheses and you try to map things. ![]() “We were looking for all the usual clues,” Ramakrishna said. Ramakrishna said the attackers’ trade craft was “extremely well done and extremely sophisticated.”Īnd they did “everything possible to hide in plain sight,” he said.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |