SolarWinds -

'This implies that not only did the attackers have a high degree of familiarity with the software, but also the fact that its existing software release management system itself was compromised — as the class in question was modified at the source code level to build a new software update containing the backdoored library, then signed, and ultimately released to the customers.'

🤔 they were very familiar with software dev and release processes.

thehackernews.com/2020/12/new-

Follow

@Dane You would think that a company in this business would have more extraordinary measures to ensure the integrity of their codebase. For instance, have a system with an air-gap do a periodic gap analysis that requires management approval. Sure, it's a lot of work, but should be table-stakes moving forward.

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.