New Evidence Suggests SolarWinds’ Codebase Was Hacked to Inject Backdoor

New Evidence Suggests SolarWinds' Codebase Was Hacked to Inject Backdoor 1

The investigation into how the attackers managed to compromise SolarWinds’ internal network and poison the company’s software updates is still underway, but we may be one step closer to understanding what appears to be a very meticulously planned and highly-sophisticated supply chain attack.

A new report published by ReversingLabs today and shared in advance with The Hacker News has revealed that the operators behind the espionage campaign likely managed to compromise the software build and code signing infrastructure of SolarWinds Orion platform as early as October 2019 to deliver the malicious backdoor through its software release process.

“The source code of the affected library was directly modified to include malicious backdoor code, which was compiled, signed, and delivered through the existing software patch release management system,” ReversingLabs’ Tomislav Pericin said.

Cybersecurity firm FireEye earlier this week detailed how multiple SolarWinds Orion software updates, released between March and June 2020, were injected with backdoor code (“SolarWinds.Orion.Core.BusinessLayer.dll” or SUNBURST) to conduct surveillance and execute arbitrary commands on target…

http://feedproxy.google.com/~r/TheHackersNews/~3/HPHQs0YyzEs/new-evidence-suggests-solarwinds.html

New Evidence Suggests SolarWinds' Codebase Was Hacked to Inject Backdoor 2
New Evidence Suggests SolarWinds' Codebase Was Hacked to Inject Backdoor 3
New Evidence Suggests SolarWinds' Codebase Was Hacked to Inject Backdoor 4
New Evidence Suggests SolarWinds' Codebase Was Hacked to Inject Backdoor 5
New Evidence Suggests SolarWinds' Codebase Was Hacked to Inject Backdoor 6

Have a comment? Type it below!