01.02.2021 Views

Cyber Defense eMagazine February 2021 Edition

Cyber Defense eMagazine February Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Does Sunburst Have Your Confidential Emails and<br />

Database Data?<br />

By Randy Reiter CEO of Don’t Be Breached<br />

So far three malware strains have been identified in the SolarWinds supply chain attack. They are the<br />

SUNBURST, SUPERNOVA and TEARDROP malware strains.<br />

Russian hackers used the malware to potentially gain access to 18,000 government and private networks<br />

via the Solarwinds Orion network management product. Initially it was believed that only a few dozen of<br />

the networks were gained access to by the hackers. Further investigative work by security firms, Amazon<br />

and Microsoft now points to 250 federal agencies and large corporations the hackers may have gained<br />

access to.<br />

These malware strains went undetected for nine months. The malware was present as a Trojan horse in<br />

Solarwinds software updates from March through June 2020. It is quite shocking that government and<br />

private sector networks were so vulnerable; and did not detect the malware over a nine month period<br />

until December, 2020.<br />

The Commerce Department, Energy Department, Homeland Security Department, National Security<br />

Administration, State Department, Treasury Department, National Institute of Health, parts of the<br />

Pentagon were government targets of the hacker data breach. In the private sector Cisco, Intel, Microsoft,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2021</strong> <strong>Edition</strong> 73<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!