Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What You Need to Know About the Massive Solarwinds Hack

What You Need to Know About the Massive Solarwinds Hack

2020 has been filled to the brim with adversity and just as we’ve mercifully arrived to the end, the largest and most brazen cyberespionage attack ever has been carried out. Today, we’ll tell you what we know about the attack, what problems it caused, and what we should learn from it going forward.

 How Did the Attack Happen?

In short, an IT management company known as SolarWinds was breached back in March, affecting a massive number of organizations—18,000 in all. These organizations include the likes of Microsoft, Cisco, and FireEye, as well as many states and federal organizations, including:

  • The U.S. Department of State
  • The U.S. Department of the Treasury
  • The U.S. Department of Homeland Security
  • The U.S. Department of Energy
  • The U.S. National Telecommunications and Information Administration
  • The National Institutes of Health, of the U.S. Department of Health
  • The U.S. National Nuclear Security Administration

When the attackers gained access to SolarWinds’ network, they were able to use what is known as a supply chain attack to introduce their malware to these departments and organizations by pushing it through the company’s automatic software update system for their Orion products. These kinds of attacks can be particularly effective since the threat is introduced to an environment via a trusted application.

Making this situation worse, many SolarWinds customers had excluded Orion products from their security checks on SolarWinds’ recommendation to prevent their other security products from shutting them down due to the malware signatures that these security products contain.

While (at the time of this writing) it is unclear what the attackers responsible used this access to do, the potential ramifications are truly terrifying. While government departments were targeted, it also needs to be said that this attack could have potentially continued from the major providers like Microsoft and Cisco to their clients, and so on and so forth. That’s why there is still no estimate of this attack’s true scope.

This attack was seemingly only discovered when an employee at FireEye received an alert that their VPN credentials had been used from a new device, and a little digging revealed the much larger situation playing out.

This Wasn’t the Only Attack, Either

Another attack was also discovered on SolarWinds’ network when the company performed an internal audit of its systems. On December 18, a second malware was found to have used the same tactic to infiltrate SolarWinds, but as of this writing does not seem to come from the same source.

What This Needs to Teach Us

Frankly, the most important lessons to be learned here are painfully obvious. First off, cybersecurity needs to be prioritized above all else, and all potential threats should be considered a likelihood. After all, the U.S. government was warned about the viability of exactly this kind of threat back in 2018 by the Government Accountability Office.

Secondly, the concept of your employees being a huge part of your cybersecurity strategy needs to be reinforced. This was only discovered when an employee was alerted of unusual activity and took that alert seriously. Your team needs to know what they are looking out for, and how to proceed if they spot it.

We may not know the scope of these attacks for a while. That shouldn’t stop you from reaching out to the IT professionals at Total Tech Care to get an assessment and a consultation. Call us today at 866-348-2602 to get started protecting your network, infrastructure, and data.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Cloud Computing Data Recovery Windows 10 Passwords Saving Money Social Media Holiday Gadgets Tech Term Chrome Virtualization Managed Service Microsoft Office Managed IT Services Automation Artificial Intelligence Cybercrime Operating System Computers Facebook Mobile Device Management Networking Health Wi-Fi IT Support Hacking BYOD Internet of Things Information Alert Remote Managed Service Provider Covid-19 Spam Office 365 Telephone Systems Information Technology Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Router BDR Human Resources Data Breach Password Money Big Data Remote Monitoring Encryption Applications Mobile Computing App History Law Enforcement Application VPN Managed IT Remote Computing Apps Mobile Office How To Government Office Tips Blockchain Training Data Storage Paperless Office Private Cloud Patch Management Vulnerability Gmail Windows 7 Settings Word Bring Your Own Device Data Management Infrastructure Two-factor Authentication Voice over Internet Protocol Work/Life Balance Servers Mouse HaaS Data Security Google Drive Flexibility Marketing WiFi Avoiding Downtime IT solutions Entertainment Wireless Website Budget Machine Learning Scam Save Time Connectivity Remote Work Firewall Cleaning Vendor Management Virtual Reality Vendor Apple Managed Services Display Social End of Support Education Physical Security User Error Data Protection Safety Meetings Employee/Employer Relationship Sports HIPAA Redundancy RMM Keyboard Risk Management Hacker The Internet of Things Lithium-ion battery USB Staff Software as a Service Conferencing Telephone System Solid State Drive Wireless Technology How to Business Intelligence Downtime IT Consultant Procurement Net Neutrality Customer Service Update Workplace Strategy Audit Worker Environment Help Desk IT Management Data storage Humor Printing Fax Server Google Docs Automobile Identity Theft Botnet IT Plan SaaS Computing Infrastructure Going Green Managed Services Provider Unsupported Software Augmented Reality Database Charger Network Congestion Fraud Battery Remote Workers eWaste Remote Worker Shadow IT Compliance Legal OneNote Computer Care Processor Current Events Cryptocurrency Internet Exlporer Virus Telephony Samsung Hard Drive Unified Threat Management Wearable Technology Retail Computer Accessories Comparison Hard Drives PDF Value Instant Messaging CES Robot Excel Computing Spam Blocking Proactive IT Electronic Medical Records Biometrics Best Practice Content Management Virtual Desktop Business Technology YouTube Hiring/Firing Access Control Printer Black Market Bluetooth DDoS Digital Signage Virtual Assistant Authentication SharePoint Document Management Project Management AI Nanotechnology IT Infrastructure Telecommuting Analyitcs Tools Programming FinTech Television Cortana Bing Social Network Digital Signature Files Warranty Chromecast Investment Employees Public Computer HVAC Employee/Employer Relationships Antivirus Google Apps Uninterrupted Power Supply Transportation Analysis ISP Windows 8 Regulations Windows 365 Colocation Computer Fan Administrator Video Conferencing Rootkit Devices ROI IT service Shortcuts Sales Monitor Enterprise Content Management Bitcoin MSP Personal Benefits Consultant Accountants Cryptomining Tablet Point of Sale Workers FENG Microchip Supply Chain Management Thought Leadership Domains Analytics Credit Cards Password Manager Monitoring Reputation IBM Password Management Batteries Streaming Media Digitize IaaS Tech Support Smart Technology Best Available Maintenance Multi-Factor Security Content Flash Windows 8.1 Techology Search Engine Laptop WIndows 7 Twitter Windows Server 2008 R2 Bloatware Business Mangement Software Tips Customer relationships Customers Supercomputer NIST IT Assessment Smart Tech Manufacturing Trending Tablets Audiobook Sync Email Best Practices Emails Touchpad Addiction Amazon Entrepreneur Recycling Security Cameras Computer Tips Managed IT Service Wiring OneDrive Two Factor Authentication Practices Biometric Security Shortcut Politics Virtual CIO Advertising Netflix Windows Media Player Root Cause Analysis Peripheral User Cache PowerPoint Amazon Web Services Cost Management Criminal Social Networking HBO Digital Security Cameras Knowledge Safe Mode Using Data Notifications Music GDPR Copiers Hosted Computing 5G Skype Data loss Quick Tip Managing Stress Wireless Internet Online Shopping Smartwatch Outlook Ergonomics Relocation Leadership File Sharing Running Cable Troubleshooting Camera Development Inventory OLED Cameras Specifications Memory Start Menu Video Games Screen Mirroring PCI DSS Loyalty Wire Virtual Machine Evernote Books Employee Travel Worker Commute Frequently Asked Questions 2FA Fiber Optics Windows 10s Printers Messaging Cabling Millennials Experience Mobile Scalability Cast Policy Smart Office Hypervisor Wireless Charging Emergency Science Business Owner Tip of the week Dark mode webinar Trend Micro Public Cloud Virtual Private Network SMS NarrowBand Employer Employee Relationship Default App Printer Server Workforce Professional Services Search Procedure Assessment Saving Time Cables Distributed Denial of Service Google Search Customer Relationship Management Windows Server 2008 dark theme iPhone Shopping

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code