*Reassuringly dull cyber security e: info@normcyber.comt: +44 (0) 203 855 6215

SolarWinds software identified as origin of FireEye breach

Back

FireEye identifies SolarWinds software supply chain compromise as origin of breach.

On December 8th cyber security company FireEye revealed that it had become the victim of a highly sophisticated cyber attack which had resulted in the compromise of some of its Red Team penetration testing tools. The subsequent investigation has now revealed that that the breach occurred as a result of a software supply chain compromise dating back to Spring 2020.

FireEye has now disclosed that the compromise was delivered through malicious updates to the widely-used Orion network monitoring product developed by SolarWinds. Consistent with its initial findings, FireEye has stated that “The campaign demonstrates top-tier operational tradecraft and resourcing consistent with state-sponsored threat actors.”

It has emerged that FireEye is one of a number of public and private sector organisations affected by the breach, and in addition to updating its own products to detect the malicious SolarWinds update, the company is continuing to scan for Indicators of Compromise amongst the wider community and is contacting impacted organisations.

Customers of norm.‘s managed Endpoint Detection and Response service, which is built upon FireEye’s industry-leading Endpoint Detection and Response software, are already fully protected against both the malicious SolarWinds update and the potential use of the Red Team penetration tools that were stolen as part of the FireEye breach.

Organisations that do not currently subscribe to norm.’s CSaaS solution are advised to deploy the relevant patches, updates and countermeasures as a priority, or to contact their ICT or managed service provider to ensure that appropriate action has been taken on their behalf.

For more information on how to protect your organisation, please refer to:
FireEye’s GitHub for SUNBURST countermeasures
SolarWinds Security Advisory

If your organisation needs further assistance in defending against this and other cyber attacks, please contact us here.

Appointing NormCyber as our virtual DPO has given Ferrero the best of both worlds – access to data protection experts who understand what we stand for as a business, without the hefty overheads usually associated with appointing an in-house DPO.

Harpreet Thandi
Regional Counsel, UK & Ireland, Ferrero

We were looking for a virtual DPO service that offered all of the benefits of a fully qualified data protection lawyer, without the overheads of an in-house hire. The DPaaS solution from norm. has been invaluable in helping us to ensure we respect the integrity of our customers’ personal information, while using it to continue to deliver differentiated products and services which support our growing customer base.

Mike Whitfield, Compliance Manager
Marmalade

CSaaS allows me to step away from multi-vendor management as the Security Operations Centre coordinates all of the technology for me.

David Vincent, CTO
Perpetuum

We were in the market for an independent Data Protection Officer service that was well versed with both UK and EU regulators. We’re thrilled to have acquired this service knowing that an expert is available 24/7.

Suzanne McCabe, Head of Project Management
James Hambro & Partners

Norm’s penetration testing layer, along with the suite of CSaaS modules has enabled MA to exceed all its audit requirements for its major clients.

Rob Elisha, ICT and CRM Manager
Montreal Associates

The speed of your Data Protection Officer’s response was very impressive – it was far quicker than I would have expected even from an in-house DPO

Will Blake, Director of Technology and Analytics
CRU Group